Skip to content
Snippets Groups Projects
Commit 0b27bea5 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update file README.md

parent f692545c
No related branches found
No related tags found
No related merge requests found
......@@ -21,7 +21,7 @@ The dataset consists of network traffic data captured from emulated IoT network
<em>Overview of the IoT network architecture</em>
</div>
You find in this dataset the graph that contains all the attacks and also one graph per attack. The graph containing all attacks is the merge of attack graphs include normal traffic.
You find in this dataset the graph that contains all the attacks and the Pcap csv file per attack. The graph containing all attacks is the merge of attacks including normal traffic.
To construct our dataset, we initially establish a test environment mirroring real-world networks and subsequently simulate diverse forms of attacks. Our testbed architecture comprises two primary components: the user network and the adversary network. Within the user network, we incorporate standard elements typical of IoT networks, including end-user devices executing various tasks to replicate the traffic patterns commonly encountered in such networks. Additionally, virtual machines emulate smart devices (IoT Devices), generating typical traffic associated with these devices. Furthermore, we integrate an onsite server furnishing services to network users, serving as the focal point for the attacks we execute on the network.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment