Traffic Correlation Based De-Anonymization of TOR Onion Services

  • Unique Paper ID: 194768
  • Volume: 12
  • Issue: 10
  • PageNo: 7713-7720
  • Abstract:
  • The recommended attack strategy depends on keeping an eye on packets with imprints from the target's negotiated guard. By hiding the real IP addresses of the participating attendants, Tor's hidden services are intended to protect privacy. Tor's architecture, which occupations layered encryption to precaution user anonymity at several levels, presents a major analytical problem. It is challenging to distinguish between Tor cells the basic building blocks of data transmission within the network—based solely on packet characteristics because they are all the same size and uniformly encrypted. This study emphasizes how strong Tor's privacy safeguards are and how crucial it is to deal with any risks to user anonymity. Anonymity networks have become increasingly popular among Internet users due to growing worries about online privacy. Of them, Tor is the most popular because it allows users and services (including hidden services) to remain anonymous. However, this anonymity is frequently used for unlawful activities, like running black marketplaces, hosting botnet command and control servers, and disseminating content that is restricted or forbidden. As a result, a variety of organizations, including governmental and law enforcement organizations, have expressed a growing interest in creating techniques to de-anonymize Tor users, disrupt its operation, and undermine its anti-censorship characteristics. In this survey, we look at current Tor network threats and provide a comprehensive review of de-anonymization techniques that target both users and hidden services. We examine how these attacks are executed and evaluate their likelihood in the real world. Finally, we outline improvements made to the Tor architecture with the goal of improving the efficacy of these de-anonymization techniques and bolstering network security in general.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{194768,
        author = {Pendem Sampath and Ravipally Sai Nikhila Reddy and B Sravan and Nirmal Keshari Swain and Satheesh Kumar S},
        title = {Traffic Correlation Based De-Anonymization of TOR Onion Services},
        journal = {International Journal of Innovative Research in Technology},
        year = {2026},
        volume = {12},
        number = {10},
        pages = {7713-7720},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=194768},
        abstract = {The recommended attack strategy depends on keeping an eye on packets with imprints from the target's negotiated guard. By hiding the real IP addresses of the participating attendants, Tor's hidden services are intended to protect privacy. Tor's architecture, which occupations layered encryption to precaution user anonymity at several levels, presents a major analytical problem. It is challenging to distinguish between Tor cells the basic building blocks of data transmission within the network—based solely on packet characteristics because they are all the same size and uniformly encrypted. This study emphasizes how strong Tor's privacy safeguards are and how crucial it is to deal with any risks to user anonymity. Anonymity networks have become increasingly popular among Internet users due to growing worries about online privacy. Of them, Tor is the most popular because it allows users and services (including hidden services) to remain anonymous. However, this anonymity is frequently used for unlawful activities, like running black marketplaces, hosting botnet command and control servers, and disseminating content that is restricted or forbidden. As a result, a variety of organizations, including governmental and law enforcement organizations, have expressed a growing interest in creating techniques to de-anonymize Tor users, disrupt its operation, and undermine its anti-censorship characteristics. In this survey, we look at current Tor network threats and provide a comprehensive review of de-anonymization techniques that target both users and hidden services. We examine how these attacks are executed and evaluate their likelihood in the real world. Finally, we outline improvements made to the Tor architecture with the goal of improving the efficacy of these de-anonymization techniques and bolstering network security in general.},
        keywords = {TOR network, Onion Service, de-anonymisation, robustness},
        month = {March},
        }

Cite This Article

Sampath, P., & Reddy, R. S. N., & Sravan, B., & Swain, N. K., & S, S. K. (2026). Traffic Correlation Based De-Anonymization of TOR Onion Services. International Journal of Innovative Research in Technology (IJIRT), 12(10), 7713–7720.

Related Articles