From 41e239f03eebc3ba184ca206b6fb2468f03b871d Mon Sep 17 00:00:00 2001
From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr>
Date: Tue, 5 Mar 2024 10:40:08 +0000
Subject: [PATCH] Update file README.md

---
 README.md | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 063b7cb..f93918c 100644
--- a/README.md
+++ b/README.md
@@ -28,7 +28,8 @@ To construct our dataset, we initially establish a test environment mirroring re
 Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed.
 
 <div align="center">
-<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" />
+<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" /> <\br>
+<em>The detialled network architecture</em>
 </div>
 
 For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment. 
-- 
GitLab