Skip to content
Snippets Groups Projects
Commit ae368e54 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update file README.md

parent 669f9817
No related branches found
No related tags found
No related merge requests found
...@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca ...@@ -41,10 +41,10 @@ To capture the network trafic in our environment, we used a flow capture tool ca
## Key Features ## Key Features
Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis. - Graph Representation: Network traffic data represented as graphs, facilitating intuitive visualization and analysis.
Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning. - Attack Scenarios: Diverse attack scenarios, including DDoS attacks, HTTP Get/Post flood, TCP SYN flood, UDP flood, ICMP flood, brute force and port scanning.
Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations. - Realistic Environment: emulated IoT network environments reflecting real-world conditions and configurations.
Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection. - Anomaly Labels: Ground truth labels for anomalous network activity, enabling supervised learning approaches for attack detection.
## Dataset Access ## Dataset Access
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment