From 669f98170d25d5273507a0eb9a30fd3a50e59022 Mon Sep 17 00:00:00 2001
From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr>
Date: Tue, 13 Feb 2024 11:17:45 +0000
Subject: [PATCH] Update file README.md

---
 README.md | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/README.md b/README.md
index af9a0ec..ef91780 100644
--- a/README.md
+++ b/README.md
@@ -25,6 +25,13 @@ Conversely, the adversary network features a botnet comprising multiple zombie m
 
 For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment. 
 
+## 1. Normal traffic generation
+For normal traffic generation, we used multiple virtual machine that were supposed to mimic the behavior of real network users. It consisted of 3 Ubuntu VMs that served as users and another Ubuntu VM that played the role of a local server providing services such as web site hosting and file sharing using FTP. We also used an Ubuntu VM to run IoT-Flock, an IoT devices simulation tool. We used it to simulate the following devices: Light intensity sensor, Temperature sensor, Smoke sensor, Door lock, Fan speed controller.
+## 2. Attack scenarios
+As for the attack scenarios, we used a botnet composed of multiple VMs controlled by a Kali virtual machine. This botnet was able to launch a variety of network attacks on the local server described above. These attacks included the following: HTTP GET flood, HTTP POST flood, ICMP flood, TCP SYN flood, UDP flood, Port scanning and Brute force.
+## 3. Data capture
+To capture the network trafic in our environment, we used a flow capture tool called CICFlowmeter.
+
 
 ## Graph modeling 
 
-- 
GitLab