RedHerring Attack: Testing the Reliability of Attack Detection