Text this: Using data−independence in the analysis of intrusion detection systems