Similar Items: Evaluating Tabular Representation Learning for Network Intrusion Detection