Text this: Intrusion signatures and analysis /