LLMs in Network Intrusion Detection – A Comprehensive Analysis