Text this: Understanding intrusion detection through Visualization