diff --git a/README.md b/README.md index ef91780a9f767c1d2097f5a707a76ef45d045ec4..09a415f1d29bdfd580fd77778bc82f88481bc7e6 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca ## Key Features -Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis. -Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning. -Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations. -Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection. +- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis. +- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning. +- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations. +- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection. ## Dataset Access