@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
## Key Features
Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
-Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
-Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.