diff --git a/README.md b/README.md index 9dd526f8b253e1259fba761526cb91f2cb640631..19938ade515eddde805fbddaea451ee571682728 100644 --- a/README.md +++ b/README.md @@ -28,7 +28,7 @@ To construct our dataset, we initially establish a test environment mirroring re Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed. <div align="center"> -<img src="images/image-2.png" alt="alt text" width="500" /> +<img src="images/image-2.png" alt="alt text" width="800" /> </div> For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment.