Research Article

The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

Algorithm 6

if  state = free
then  state = busy
if  SEARCH  (cM,  data     Prt = 0)
then  if  SEARCH  (sDB, data     attack     IPaddr)
  then  attack     IPaddr     Count + 1
else
if  TLNod
  then  
if  TRServ
  then  
state = free