@@ -31,8 +31,9 @@ For normal traffic generation, we used multiple virtual machine that were suppos
## 2. Attack scenarios
As for the attack scenarios, we used a botnet composed of multiple VMs controlled by a Kali virtual machine. This botnet was able to launch a variety of network attacks on the local server described above. These attacks included the following: HTTP GET flood, HTTP POST flood, ICMP flood, TCP SYN flood, UDP flood, Port scanning and Brute force.
## 3. Data capture
To capture the network trafic in our environment, we used a flow capture tool called CICFlowmeter.
To capture the network trafic in our environment, we used Wireshark tool to record the network data in pcap format and used a flow capture tool called CICFlowmeter.

## Graph modeling
...
...
@@ -67,3 +68,22 @@ Creative Commons Attribution. CC BY 4.0 Deed Attribution 4.0 International.