“…Traffic attacks Studies on new proposed traffic attacks [46], [37], [47] Relay detection Deanonymizing Tor traffic through relay detection [48], [49] Counterattack Counter attack techniques in the dark web [50], [51], [52] Real-time attack detection Applying attack detection techniques on real-time data [53], [54], [55] Data balancing Impact of data balancing Studies focusing on data balancing techniques and their impact on darknet traffic classification [56], [57] Feature selection Feature selection algorithm Studies focusing on the feature selection for the classification purpose [58], [57], [12], [59] Figure 9 Percentage Classification of the Literature reviewed…”