1 Introduction
In order to conduct lawful surveillance, law enforcement agencies need the ability to trace Internet communications among those suspected of criminal or terrorist activities. Traditionally, the source and destination IP addresses in an IP header have allowed investigators to trace communication sessions and determine corresponding participants, timing, frequency, and quantity. However, the proliferation of anonymous communication systems [1]–[4] on the Internet has posed significant challenges to effectively tracing communications. For example, web file downloading can be disguised using anonymous communication systems such as Tor [4], [5], preventing detection of illegal use in cases, such as child pornography [5]. Terrorists or criminals might use anonymous communication systems to exchange information and develop plots, without being detected.