Text this: Effectiveness of security tools to anomalies on tunneled traffic