Next Article in Journal
Evaluating the Effectiveness of Information Security Management Systems: An Analysis Framework and Key Metrics
Previous Article in Journal
A Novel Hybrid Quantum Circuit for Integer Factorization: End-to-End Evaluation in Simulation and Real Quantum Hardware
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

De-Anonymization Techniques in the Tor Network Using an Experimental Testbed

1
Department of Computers and Informatics, Technical University of Kosice, 042 00 Kosice, Slovakia
2
CSIRT.SK (Computer Incident Response Team), Ministry of Investment, Regional Development and Informatization of the Slovak Republic, 811 09 Bratislava, Slovakia
3
Academy of the Police Force in Bratislava, Sklabinská 1, 835 17 Bratislava, Slovakia
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2026, 6(2), 72; https://doi.org/10.3390/jcp6020072
Submission received: 27 January 2026 / Revised: 22 February 2026 / Accepted: 8 April 2026 / Published: 13 April 2026
(This article belongs to the Section Security Engineering & Applications)

Abstract

Tor is an anonymization network that enables access to hidden services and protects user identity through layered encryption. While its core technology offers strong privacy, users can still be exposed through indirect attack methods or configuration mistakes. This research not only explores de-anonymization techniques but also provides a practical guide for constructing a fully functional experimental Tor environment using virtual machines. The custom-built testbed allows for safe simulation of attacks without impacting the public Tor network. Within this environment, three key information-gathering approaches were evaluated: (1) malware-based reverse shells that establish external communication, (2) malicious PDF and Office files used to trigger outbound connections, and (3) analysis of service misconfigurations that may reveal the IP address of hidden services. The results confirm that although the Tor network itself is resilient, user behavior, improper configurations, and insecure content handling can lead to significant privacy risks. By combining practical environment setup with real-world attack scenarios, this paper serves both as a reference for building experimental Tor networks and as a security-oriented analysis of known de-anonymization vectors. The findings emphasize the critical need for user awareness and precise configuration in privacy-focused technologies.
Keywords: Tor network; de-anonymization; hidden services; malware; misconfiguration; PDF and Office file exploits Tor network; de-anonymization; hidden services; malware; misconfiguration; PDF and Office file exploits

Share and Cite

MDPI and ACS Style

Kainz, O.; Petro, S.; Michalko, M.; Murin, M.; Šimko, E. De-Anonymization Techniques in the Tor Network Using an Experimental Testbed. J. Cybersecur. Priv. 2026, 6, 72. https://doi.org/10.3390/jcp6020072

AMA Style

Kainz O, Petro S, Michalko M, Murin M, Šimko E. De-Anonymization Techniques in the Tor Network Using an Experimental Testbed. Journal of Cybersecurity and Privacy. 2026; 6(2):72. https://doi.org/10.3390/jcp6020072

Chicago/Turabian Style

Kainz, Ondrej, Sebastián Petro, Miroslav Michalko, Miroslav Murin, and Ervín Šimko. 2026. "De-Anonymization Techniques in the Tor Network Using an Experimental Testbed" Journal of Cybersecurity and Privacy 6, no. 2: 72. https://doi.org/10.3390/jcp6020072

APA Style

Kainz, O., Petro, S., Michalko, M., Murin, M., & Šimko, E. (2026). De-Anonymization Techniques in the Tor Network Using an Experimental Testbed. Journal of Cybersecurity and Privacy, 6(2), 72. https://doi.org/10.3390/jcp6020072

Article Metrics

Back to TopTop