Skip to content
Snippets Groups Projects
Commit cb347018 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update 9 files

- /image.png
- /image-1.png
- /image-3.png
- /image-2.png
- /images/image.png
- /images/image-1.png
- /images/image-3.png
- /images/image-2.png
- /README.md
parent 6c7b2c5b
No related branches found
No related tags found
No related merge requests found
......@@ -10,7 +10,7 @@ The Graph-Based Dataset for IoT Network Attack Detection is a curated collection
The dataset consists of network traffic data captured from emulated IoT network environments, where various attack scenarios have been emulated. The network traffic data is represented in the form of graphs, capturing the interactions and relationships between different devices, services, and communication patterns within the IoT network. Each graph in the dataset represents a snapshot of network activity over a specific time period, enabling analysis of attack patterns and behaviors. The following figure presents the general netwok architecture.
<div align="center">
<img src="image-1.png" title="Overview of the IoT network architecture" alt="alt text" width="500" />
<img src="images/image-1.png" title="Overview of the IoT network architecture" alt="alt text" width="500" />
<em>Overview of the IoT network architecture</em>
</div>
......@@ -21,7 +21,7 @@ To construct our dataset, we initially establish a test environment mirroring re
Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed.
<div align="center">
<img src="image-2.png" alt="alt text" width="500" />
<img src="images/image-2.png" alt="alt text" width="500" />
</div>
For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment.
......@@ -37,7 +37,7 @@ To capture the network trafic in our environment, we used a flow capture tool ca
## Graph modeling
<div align="center">
<img src="image.png" alt="alt text" width="500" />
<img src="images/image.png" alt="alt text" width="500" />
</div>
## Key Features
......@@ -63,7 +63,7 @@ This work is supported by the French National Research Agency (ANR) under grant
## License
Creative Commons Attribution. CC BY 4.0 Deed Attribution 4.0 International.
<img src="image-3.png" alt="alt text" width="250" />
<img src="images/image-3.png" alt="alt text" width="250" />
## Project status
Current
File moved
File moved
File moved
File moved
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment