Text this: How to Effectively Collect and Process Network Data for Intrusion Detection?