Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems