Research Article
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning
| Input: | | Output: | | (1) | Client sends request to DS | | (2) | Set ([])DS // returns the routing information to Client | | (3) | for1 to n do | | (4) | router whose performance is good will be selected | | (5) | end for | | (6) | Client connects to HSDS and sends the to it | | (7) | if is failure then | | (8) | return false | | (9) | else | | (10) | Client get the information of IPO from HSDS | | (11) | end if | | (12) | for1 to n do | | (13) | Client selects a OR as RPO and sends its information to HS via IPO | | (14) | end for | | (15) | return true //data transmission can be started |
|