Vampire Attacks are not for specific Protocols. But these type of attacks exploit general properties of protocol classes such as link-state, distance vector, source routing, and geographic and beacon routing. It is very difficult to track these type of attacks. Because they uses the messages of protocols such as ICMP Messages. (Internet Control Message Protocol).
Vampire Attacks parameters: Stretch attacks create a long route(false Route) from Source to Destination which consumes lot of energy. For Example Valid route(Path) from Source to destination A-->C === A-->B-->C. But false route will be some thing like A-->C === A-->B-->D. -->E-->F-->C. Parameters are Source, Destination, Packet Id, Time to live, Next Hop, Routers etc. The parameters mainly depend on the specific Network. The parameters that are mentioned above are common to all.