From db215e9937be4bf437c07e308f2f82fce2aba300 Mon Sep 17 00:00:00 2001
From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr>
Date: Mon, 12 Feb 2024 16:32:40 +0000
Subject: [PATCH] Update file README.md

---
 README.md | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/README.md b/README.md
index 47c2d89..de89162 100644
--- a/README.md
+++ b/README.md
@@ -6,11 +6,9 @@
 The Graph-Based Dataset for IoT Network Attack Detection is a curated collection of data specifically designed for research and development in the field of cybersecurity, focusing on the detection of attacks in Internet of Things (IoT) networks. This graph-based dataset provides researchers, developers, and practitioners with a comprehensive resource to evaluate and benchmark various detection algorithms and systems in real-world IoT network environments.
 
 ## Dataset Description
-[comment]: # (Still another comment)
 
 The dataset consists of network traffic data captured from emulated IoT network environments, where various attack scenarios have been emulated. The network traffic data is represented in the form of graphs, capturing the interactions and relationships between different devices, services, and communication patterns within the IoT network. Each graph in the dataset represents a snapshot of network activity over a specific time period, enabling analysis of attack patterns and behaviors. The following figure presents the general netwok architecture.
 
-[comment]: # (![Alt text](image-1.png))
 <img src="image-1.png" alt="alt text" width="500" />
 
 You find in this dataset the graph that contains all the attacks and also one graph per attack. The graph containing all attacks is the merge of attack graphs include normal traffic. 
@@ -19,14 +17,14 @@ To construct our dataset, we initially establish a test environment mirroring re
 
 Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed.
 
-![Alt text](image-2.png)
+<img src="image-2.png" alt="alt text" width="500" />
 
 For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment. 
 
 
 ## Graph modeling 
 
-![Alt text](image.png)
+<img src="image.png" alt="alt text" width="500" />
 
 
 ## Key Features
-- 
GitLab