How to Decide on a Dataset for Detecting Cyber-Attacks