Text this: Overcoming the challenges of data lack, leakage, and dimensionality in intrusion detection systems: a comprehensive review