Research Article
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning
Input: | Output: | (1) | Client sends request to DS | (2) | Set ([])DS // returns the routing information to Client | (3) | for1 to n do | (4) | router whose performance is good will be selected | (5) | end for | (6) | Client connects to HSDS and sends the to it | (7) | if is failure then | (8) | return false | (9) | else | (10) | Client get the information of IPO from HSDS | (11) | end if | (12) | for1 to n do | (13) | Client selects a OR as RPO and sends its information to HS via IPO | (14) | end for | (15) | return true //data transmission can be started |
|