Text this: Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks