From ae368e54c9c1b5005ad0ee12877baeb63915fea6 Mon Sep 17 00:00:00 2001 From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr> Date: Tue, 13 Feb 2024 11:18:44 +0000 Subject: [PATCH] Update file README.md --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index ef91780..09a415f 100644 --- a/README.md +++ b/README.md @@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca ## Key Features -Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis. -Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning. -Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations. -Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection. +- Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis. +- Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning. +- Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations. +- Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection. ## Dataset Access -- GitLab