“…Study on obfuscated Tor traffic analysis [1], [2], [3] Non-obfuscated traffic Study on non-obfuscated traffic analysis [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17] Multiple browser classification Study classifying the darknet traffic into multiple browsers [18], [19], [20] Browser settings Classification of the darknet browser through its settings [21], [22], [23], [24], [25] Padded traffic detection Classification of traffic after applying the defense mechanism [6] Traffic classification under adversarial settings Classification of Tor traffic under adversarial settings [1], [26] Application-based…”