Fig. 3From: Detection of illicit cryptomining using network metadataTypical deployment scenario for XMR-RAYBack to article page