Protocols for Testing Intrusion Detection?