From: Ant colony optimization-based firewall anomaly mitigation engine
Segments | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Action constraints generated by Algorithm 2 for Policy 1 | A | A | A | A | A | A | A | D | A | D | A | D | A | A | A | D | A | D |
Action in first vertically appearing block in the segments of Table 4 | A | A | A | A | A | A | D | D | A | A | A | A | A | A | A | A | A | D |
Satisfied (S)/not satisfied (NS) | S | S | S | S | S | S | NS | S | S | NS | S | NS | S | S | S | NS | S | S |