@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
...
@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
## Key Features
## Key Features
Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
-Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
-Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.