ANALYZING DARKNET TRAFFIC: IMPACT OF MODIFIED TOR TRAFFIC PATTERNS ON ONION SERVICE CLASSIFICATION ACCURACY
DOI:
https://doi.org/10.64751/ijpams.2025.v5.n4.pp87-93Keywords:
Tor network, Darknet traffic, Onion Services, traffic classification, adversarial perturbation, deep learning, traffic obfuscation.Abstract
Darknet communication, especially through the Tor network, has become a crucial focus of cybersecurity research due to increasing misuse by malicious actors. However, identifying and classifying Onion Service traffic remains challenging because Tor encrypts packet contents and introduces obfuscation mechanisms. This study investigates how modified Tor traffic patterns, including padding variations, timing perturbations, and circuit-level manipulation, influence the accuracy of Onion Service traffic classification systems. A hybrid analytical model combining flow-level statistical features, deep learning– based traffic embeddings, and adversarial perturbation analysis is used to evaluate classification resilience. Experimental results show that even minor manipulations significantly reduce classifier confidence and increase misclassification rates, emphasizing the vulnerability of current Darknet monitoring systems [1], [3], [5], [9]. The findings provide critical insights for designing more robust traffic analysis systems capable of detecting evasion strategies within Tor-based communication.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.