Network Intrusion Analysis: Methodologies, Tools, and