Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Algorithm 7

if  (attack    IPaddr    Count    thr)
then  (attack    IPaddr = block)
SEND (IM, attack     IPaddr)
SEND (EM, attack    IPaddr)
INSERTDB (sDB, IPaddr)