Authored by chunhua.zhang

Update Readme.md

... ... @@ -3,7 +3,8 @@
## Outline
Mlicious request detection based on http request access log.
http://git.yoho.cn/ops/malicious-detection/blob/master/arch.jpg
![Alt text](http://git.yoho.cn/ops/malicious-detection/blob/master/arch.jpg)
## Access Log
Access Log is generated by inteceptor at YOHO Gateway project. It logs every http request info, including client ip, user-agent, request params, http reponse status, etc.
... ...