RE: Protocols for Testing Intrusion Detection?