Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Algorithm 1

if TIMER
then  NEWTIMER(f)
if   = TCP
  then  TRYTOCONNECT((trgIPaddr))
  if  connected
   then SENDPKTTO((IPaddr), , , , )
else SENDPKTTO((IPaddr), , , )