Update README.md

parent 1e480d75
...@@ -73,6 +73,8 @@ System Architecture ...@@ -73,6 +73,8 @@ System Architecture
**System Overview Diagram** **System Overview Diagram**
http://gitlab.sliit.lk/2020---092/2020-092/blob/master/Images/system_overview_diagram.JPG
According to the above diagram, first malicious traffic signatures should be obtained from the raw data and then added to the database. In order do this a dataset which is related to the NTP Amplification attack is used. Then by using the feature selection generation of the SDS will be done and afterwards the Machine Learning Algorithm is being trained. Then it is supplied to the system of traffic classification. According to the above diagram, first malicious traffic signatures should be obtained from the raw data and then added to the database. In order do this a dataset which is related to the NTP Amplification attack is used. Then by using the feature selection generation of the SDS will be done and afterwards the Machine Learning Algorithm is being trained. Then it is supplied to the system of traffic classification.
**Other Necessary Instructions to run the code:** **Other Necessary Instructions to run the code:**
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment