

The manipulated cells traverse middle onion routers and arrive at an exit onion router along a circuit. A malicious entry onion router may duplicate, modify, insert, or delete cells of a TCP stream from a sender.

Different from cell-counting attacks, these attacks can confirm anonymous communication relationships quickly and accurately by manipulating one single cell and pose a serious threat against Tor.

In this paper we are comparing cell-counting attacks and browser attacks against TOR. It doesn't allow network surveillance or traffic analysis to get tracked but most of these software used equal size of cells (512B). The onion router (TOR) allows to hide your identity various software under this categories are available that allows online anonymity network, supporting TCP applications over the Internet.
