Re: Protocols for Testing Intrusion Detection?