A Comparative Analysis of Tools for Testing the Security Protocols