From: Ant colony optimization-based firewall anomaly mitigation engine
Segments | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Action constraints | A | A | A | A | A | A | A | D | A | D | A | D | A | A | A | D | A | D |
Strategy applied by Algorithm 2 | – | – | AO | – | – | AO | AO | – | – | DO | AO | RFMO | – | – | AO | RFMO | – | – |