The anonymous system Tor uses an asymmetric algorithm to protect the content of communications, allowing criminals conceal their identities and hide tracks. This malicious usage brings serious security threats public social stability. Statistical analysis traffic flows can effectively identify classify flow. However, few features be extracted from traffic, which have a weak representational abi...