Skip to content
Snippets Groups Projects
Commit f5a54676 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update file README.md

parent 41e239f0
No related branches found
No related tags found
No related merge requests found
......@@ -28,7 +28,7 @@ To construct our dataset, we initially establish a test environment mirroring re
Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed.
<div align="center">
<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" /> <\br>
<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" />
<em>The detialled network architecture</em>
</div>
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment