Research Article

Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning

Algorithm 1

Client connects to HS.
Input:
Output:
(1)Client sends request to DS
(2)Set ([])DS // returns the routing information to Client
(3)for1 to n do
(4)router whose performance is good will be selected
(5)end for
(6) Client connects to HSDS and sends the to it
(7)if is failure then
(8)return false
(9)else
(10)Client get the information of IPO from HSDS
(11)end if
(12)for1 to n do
(13)Client selects a OR as RPO and sends its information to HS via IPO
(14)end for
(15)return true //data transmission can be started