Research Article
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning
Figure 2
Communication between the client and HS. “a” is client, “b” is OR, “c” is HSDS, and “d” is HS. “Step n” is the order of communication.