Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice