Configuring Protocol-Specific Intrusions