International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 187 - Number 20 |
Year of Publication: 2025 |
Authors: Pavan Kumar Pativada, Rahul Karne, Akhil Dudhipala |
![]() |
Pavan Kumar Pativada, Rahul Karne, Akhil Dudhipala . Multimodal Threat Actor Profiling on the Tor Network: Techniques, Datasets, and Ethical Challenges. International Journal of Computer Applications. 187, 20 ( Jul 2025), 1-7. DOI=10.5120/ijca2025925278
Profiling threat actors operating on the Tor network presents considerable challenges due to its intrinsic anonymity and layered encryption. This paper offers a comprehensive survey of major advancements between 2019 and 2025, with reference to foundational tools and methods developed earlier where relevant (e.g., Tor simulation, darknet datasets). Core methodological approaches include stylometric analysis of linguistic features [8, 9], content classification of hidden services [2, 5], encrypted traffic analysis [7], temporal behavioral modeling [10], and graph-based account linkage [6, 12]. A conceptual profiling system is proposed that ingests heterogeneous data sources—such as textual posts, metadata, and traffic logs—extracts modality-specific features (e.g., writing style, network flow patterns, timestamp distributions), and applies domainaligned ML models for multimodal embedding and identity fusion. To illustrate its practical relevance, a synthetic case study is presented demonstrating how AI techniques can correlate a threat actor’s forum posts and marketplace listings to infer authorship and behavioral alignment. Key public datasets and tools are also cataloged—including Veri- Dark [9], CoDA [5], DUTA [2], ISCX-Tor [7], and the Shadow simulator [4]—that enable reproducible research in this domain. The survey concludes with a discussion of critical ethical and legal considerations, including compliance with the EU General Data Protection Regulation (GDPR) [11], the European Union Artificial Intelligence Act [1], and U.S. surveillance law under FISA Section 702 [3]. This paper aims to provide a rigorously referenced, technically detailed, and ethically grounded synthesis of state-of-the-art methods in AI-driven threat actor profiling on the Tor network.