“…The analysis of darknet traffic provides complete information to the cybersecurity specialists, and other IT operators about the services exploited by attackers or vulnerable to some attack [6], [7], [8], [9]. Researchers now focus on analyzing the darknet traffic, specifically detecting Tor applications to determine the malicious activities [10], [11], [12], [13], [14]. To achieve the detection objective, authors used ML, and Deep Learning (DL) techniques [15], [16], [17], [18].…”