Envoyer par SMS: How to Effectively Collect and Process Network Data for Intrusion Detection?