diff --git a/README.md b/README.md index 2b922212b2113ff686fa3c06345870fd228701d8..00823c31b0623b4fabf9a9884ae03fe6da84efed 100644 --- a/README.md +++ b/README.md @@ -17,7 +17,7 @@ To construct our dataset, we initially establish a test environment mirroring re Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed. -<img src="image-2.png" alt="alt text" width="500" /> +<img position="center" src="image-2.png" alt="alt text" width="500" /> For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment.