Text this: The development and analysis of intrusion detection algorithms