De-anonymizing of entities on the onion sites operating on TOR Network

  • Unique Paper ID: 178646
  • Volume: 11
  • Issue: 12
  • PageNo: 4338-4345
  • Abstract:
  • Onion services and Tor facilitates anonymous communication, giving users and service operators added privacy. Nevertheless, the problems of Tor anonymity impact cyber security and law enforcement, especially when such services are used for illegal purposes. In this paper, we propose a two-stage API-based approach for the de-anonymizing of actors on onion sites. Initially, we utilized an IP intelligence API to find possible IP addresses that could be linked to specific onion services. Next, these IP addresses were checked against a threat intelligence database through another API to confirm that these IP addresses were flagged on blacklists associated with spam, malware, and cybercrime. This allowed for the linkage of concealed traffic data with recognizable and potentially hazardous entities. Our results demonstrate that in the Tor ecosystem, critical information can be exposed due to misconfiguration, exit node behavior, and dependency on external services. We discuss the ethical ramifications of this work while providing principles intended for responsible de-anonymizing action conducted on non-legitimate domains of anonymity. This work highlights the enduring controversy over the extent of digital privacy and security.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 12
  • PageNo: 4338-4345

De-anonymizing of entities on the onion sites operating on TOR Network

Related Articles