Skip to content
Snippets Groups Projects
Commit a9794898 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update file README.md

parent 281fb36c
No related branches found
No related tags found
No related merge requests found
...@@ -9,7 +9,7 @@ The Graph-Based Dataset for IoT Network Attack Detection is a curated collection ...@@ -9,7 +9,7 @@ The Graph-Based Dataset for IoT Network Attack Detection is a curated collection
The dataset consists of network traffic data captured from emulated IoT network environments, where various attack scenarios have been emulated. The network traffic data is represented in the form of graphs, capturing the interactions and relationships between different devices, services, and communication patterns within the IoT network. Each graph in the dataset represents a snapshot of network activity over a specific time period, enabling analysis of attack patterns and behaviors. The following figure presents the general netwok architecture. The dataset consists of network traffic data captured from emulated IoT network environments, where various attack scenarios have been emulated. The network traffic data is represented in the form of graphs, capturing the interactions and relationships between different devices, services, and communication patterns within the IoT network. Each graph in the dataset represents a snapshot of network activity over a specific time period, enabling analysis of attack patterns and behaviors. The following figure presents the general netwok architecture.
**! [Alt text](image-1.png) ** // ![Alt text](image-1.png)
<img src="image-1.png" alt="alt text" width="500" /> <img src="image-1.png" alt="alt text" width="500" />
You find in this dataset the graph that contains all the attacks and also one graph per attack. The graph containing all attacks is the merge of attack graphs include normal traffic. You find in this dataset the graph that contains all the attacks and also one graph per attack. The graph containing all attacks is the merge of attack graphs include normal traffic.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment