Clickstream tracking of TOR users: may be easier than you think

@article{Vlajic2018ClickstreamTO,
  title={Clickstream tracking of TOR users: may be easier than you think},
  author={Natalija Vlajic and Pooria Madani and Ethan Nguyen},
  journal={Journal of Cyber Security Technology},
  year={2018},
  volume={2},
  pages={108 - 92}
}
ABSTRACT As the importance and prevalence of web analytics have increased over the last decade, so has the number of user trying to maintain their online anonymity. The Onion Routing (TOR) system is often seen as the best anonymity tool out there and is used by nearly 2.5 million people daily. For a significant number of these users, many of TOR’s features and terms are rather difficult to comprehend; yet, these users tend to believe that TOR offers more privacy protection than what it is… 
A Review on Classification of Tor-Nontor Traffic and Forensic Analysis of Tor Browser
TLDR
A review on Classification of Tor-Nontor traffic and the Forensic Analysis of Tor Browser are there and the results can be helpful for Law Enforcement Agencies in cases where a Tor browser user is under an investigation.

References

SHOWING 1-10 OF 24 REFERENCES
A Usability Evaluation of Tor Launcher
TLDR
The first usability evaluation of Tor Launcher, the graphical user interface that Tor Browser uses to configure connections to Tor, is performed, showing that users were often frustrated during the process and tried options at random.
A Survey on Web Tracking: Mechanisms, Implications, and Defenses
TLDR
This survey reviews the existing literature on the methods used by web services to track the users online as well as their purposes, implications, and possible user’s defenses, and presents five main groups of methods used for user tracking.
A Practical Attack to De-anonymize Social Network Users
TLDR
A novel de-anonymization attack is introduced that exploits group membership information that is available on social networking sites and shows that information about the group memberships of a user is sufficient to uniquely identify this person, or to significantly reduce the set of possible candidates.
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication
TLDR
It is demonstrated that an attacker can abuse an unfortunate interplay of technologies to design a side channel in the communication of Tor, allowing short web page markers to be transmitted to expose the web page a user visits over Tor.
Users get routed: traffic correlation on tor by realistic adversaries
We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying
User Authentication from Web Browsing Behavior
Abstract : As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and
Anonymity on QuickSand: Using BGP to Compromise Tor
TLDR
It is shown that AS-level adversaries are much more powerful than previously thought, and routine BGP routing changes can significantly increase the number of ASes that can analyze a user's traffic successfully.
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
TLDR
A novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies is introduced, using single-end controlled available bandwidth estimation tools and a colluding network entity that can modulate the traffic destined for the victim.
Establishing a Legitimate Expectation of Privacy in Clickstream Data
I. The Internet and Clickstream Data Collection ................62 II. The Fourth Amendment and the Internet............................70 A. A Brief Overview of the Fourth Amendment’s Expectation of
Why do people seek anonymity on the internet?: informing policy and design
TLDR
A key finding of this research is the very large variation in interviewees' past experiences and life situations leading them to seek anonymity, and how they tried to achieve it.
...
...