diff --git a/README.md b/README.md
index f93918c15e251d41b779748c468c821fd399b49c..fe5e1dd6760c2d621757ef1d6f98858820551014 100644
--- a/README.md
+++ b/README.md
@@ -28,7 +28,7 @@ To construct our dataset, we initially establish a test environment mirroring re
 Conversely, the adversary network features a botnet comprising multiple zombie machines overseen by a singular bot-master machine functioning as a Command and Control (C&C) server. Through this central machine, we can orchestrate an array of botnet attacks directed at the user network. The following figure illustrates the architectural of our testbed.
 
 <div align="center">
-<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" /> <\br>
+<img src="images/image-2.png" alt="alt text" width="800" title="The detialled network architecture" /> 
 <em>The detialled network architecture</em>
 </div>