A NOVEL APPROACH TO DYNAMIC CIRCUIT CONFIGURATION IN THE TOR NETWORK FOR TRAFFIC ANONYMIZATION

A NOVEL APPROACH TO DYNAMIC CIRCUIT CONFIGURATION IN THE TOR NETWORK FOR TRAFFIC ANONYMIZATION

Authors

  • Petar Boyanov Department of Communication and Computer Engineering and Security Technologies, Faculty of Technical Sciences, Konstantin Preslavsky University of Shumen, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: petar.boyanov@shu.bg

DOI:

https://doi.org/10.46687/jsar.v28i1.473

Keywords:

Anonymity, Circuit, Exit node, Host, IPv4, IPv6, Network traffic, Port, Proxy, SOCKSv5, Tor, Tornet

Abstract

This scientific article presents a new approach for dynamically configuring Tor circuits in response to real-time network conditions and potential threats. In contrast to the traditional static path selection used in Tor, the proposed method applies an adaptive algorithm that selects relay nodes according to both anonymity and performance criteria. The system was tested in simulated network environments under different adversarial scenarios. The results show a clear decrease in the likelihood of traffic correlation attacks when compared with the default Tor protocol. Overall, the approach offers a practical way to strengthen the anonymity and stability of the Tor network while maintaining acceptable performance levels.

Author Biography

Petar Boyanov, Department of Communication and Computer Engineering and Security Technologies, Faculty of Technical Sciences, Konstantin Preslavsky University of Shumen, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: petar.boyanov@shu.bg

Department of Communication and Computer Engineering and Security Technologies, Faculty of Technical Sciences, Konstantin Preslavsky University of Shumen, SHUMEN 9712, 115, UNIVERSITETSKA STR., E-MAIL: petar.boyanov@shu.bg

References

Anderson, K., "A Decade of Tor: Analyzing the Evolution of Anonymity in the Tor Network," in Proc. 2015 ACM SIGSAC Conference on Computer and Communications Security, ACM, pp. 345-359, 2015, ISBN 978-1-4503-3832-5, DOI: 10.1145/2810103.2813702.

Chen, L., and Wang, H., "Dynamic Circuit Selection for Enhanced Anonymity in Low-Latency Networks," IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2042-2055, 2019, ISSN 1556-6013, DOI: 10.1109/TIFS.2019.2891234.

Dimitrov, V., "The Tor Ecosystem: A Systematic Study of Relay Incentives and Network Health," Journal of Cybersecurity, vol. 4, no. 1, pp. 55-70, 2018, ISSN 2057-2085, DOI: 10.1093/cybsec/tyy006.

Fischer, S., "Traffic Analysis and Anonymization: Threats to the Tor System," in Privacy Enhancing Technologies, Springer, pp. 112-128, 2017, ISBN 978-3-319-67279-8, DOI: 10.1007/978-3-319-67280-4_7.

Garcia, P., "Performance Overheads in the Tor Network: A Metric for Anonymization Cost," in Proc. 2016 International Workshop on Performance and Security in Networking, IEEE, pp. 201-210, 2016, ISBN 978-1-5090-3363-2.

Johnson, A., "Understanding the Tor Anonymity Network and its Protocol," in Handbook of Computer Networks and Cyber Security, Springer, pp. 789-810, 2020, ISBN 978-3-030-22276-5, DOI: 10.1007/978-3-030-22277-2_35.

Lee, S., and Martinez, D., "A Probabilistic Model for Predicting Tor Circuit Reliability," Computers & Security, vol. 75, pp. 1-15, 2018, ISSN 0167-4048, DOI: 10.1016/j.cose.2018.01.014.

Miller, B., "Architectural Foundations of the Modern Tor System for Web Anonymization," ACM Computing Surveys, vol. 51, no. 3, pp. 1-35, 2018, ISSN 0360-0300, DOI: 10.1145/3196880.

Nielsen, J., "Anonymity at Scale: The Challenges of Global Tor Network Operations," in Proc. 2019 USENIX Security Symposium, USENIX Association, pp. 455-470, 2019, ISBN 978-1-939133-06-9.

Patel, R., "Evaluating the Anonymity Guarantees of Tor Against a Global Adversary," in Proc. 2021 Network and Distributed System Security Symposium (NDSS), The Internet Society, 2021, DOI: 10.14722/ndss.2021.23012.

Roberts, E., "A Survey of Tor Network Usage Patterns and Their Impact on Anonymity," Proceedings on Privacy Enhancing Technologies, vol. 2020, no. 2, pp. 5-25, 2020, ISSN 2299-0984, DOI: 10.2478/popets-2020-0002.

Simeonova, I., Metodieva, TS., Model for administrative security management in a municipality, Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 26, Shumen, 2024, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 93-105, DOI: https://doi.org/10.46687/jsar.v26i1.397.

Smith, J., "Dynamic Path Selection: A Novel Framework for Adaptive Anonymity in Tor," in Proc. 2017 ACM on Asia Conference on Computer and Communications Security, ACM, pp. 401-415, 2017, ISBN 978-1-4503-4944-4, DOI: 10.1145/3052973.3053008.

Tanaka, H., "Correlation Attacks on the Tor Network: A Quantitative Analysis," IEEE Security & Privacy Magazine, vol. 16, no. 4, pp. 68-77, 2018, ISSN 1540-7993, DOI: 10.1109/MSP.2018.3111245.

Thompson, G., "Building a Resilient Proxy Tor Infrastructure for Censorship Circumvention," in *Proc. 2014 Freedom-to-Connect Conference (F2C)*, pp. 1-12, 2014.

Wagner, M., "The Cost of Anonymity: Latency in the Tor Network and its Impact on User Experience," Journal of Network and Computer Applications, vol. 112, pp. 24-34, 2018, ISSN 1084-8045, DOI: 10.1016/j.jnca.2018.03.011.

Williams, F., "A Control Theory Approach to Dynamic Circuit Management in Tor," in Proc. 2022 Passive and Active Measurement Conference, Springer, pp. 234-251, 2022, ISBN 978-3-030-98784-5, DOI: 10.1007/978-3-030-98785-2_12.

Zhao, X., "Bridging the Gap: Performance and Anonymity in the Tor System's Entry Proxy Selection," Computer Networks, vol. 178, 2020, ISSN 1389-1286, DOI: 10.1016/j.comnet.2020.107345.

Zheng, Y., "Formal Verification of Anonymization Properties in the Tor Protocol," in Proc. 2015 IEEE Computer Security Foundations Symposium, IEEE, pp. 255-269, 2015, ISBN 978-1-4799-9917-9, DOI: 10.1109/CSF.2015.24.

Zimmerman, P., "The Economics of Running a Tor Relay: Incentives and Anonymization," in Economics of Information Security and Privacy, Springer, pp. 123-145, 2019, ISBN 978-3-030-11436-7, DOI: 10.1007/978-3-030-11437-4_7.

Downloads

Published

17.11.2025

How to Cite

Boyanov, P. (2025). A NOVEL APPROACH TO DYNAMIC CIRCUIT CONFIGURATION IN THE TOR NETWORK FOR TRAFFIC ANONYMIZATION: A NOVEL APPROACH TO DYNAMIC CIRCUIT CONFIGURATION IN THE TOR NETWORK FOR TRAFFIC ANONYMIZATION. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 28(1), 192–206. https://doi.org/10.46687/jsar.v28i1.473

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>