A Study in Protocol Obfuscation Techniques and their Effectiveness