Research Article

Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning

Figure 2

Communication between the client and HS. “a” is client, “b” is OR, “c” is HSDS, and “d” is HS. “Step n” is the order of communication.