The process is done using traffic analysis.
They used CISCO routers in their research.
And since CISCO defines all major networking standards, it is applicable to every router available.
Tor is susceptible to this kind of traffic analysis because it was designed for low-latency.
This kind of monitoring, even on a large scale does not require many resources.
source: www.techworm.net