An Attack Vs. An Anomaly: What’s The Difference?