Research Article
The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
if (attack IPaddr Count thr) | then (attack IPaddr = block) | SEND (IM, attack IPaddr) | SEND (EM, attack IPaddr) | INSERTDB (sDB, IPaddr) |
|