Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it