Text this: Comprehensive Review of Intrusion Detection Techniques: ML and DL in Different Networks