Skip to main content
Top
Published in: Mobile Networks and Applications 1/2020

01-02-2020

A Market in Dream: the Rapid Development of Anonymous Cybercrime

Authors: Gengqian Zhou, Jianwei Zhuge, Yunqian Fan, Kun Du, Shuqiang Lu

Published in: Mobile Networks and Applications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper we have conducted a comprehensive measurement and analysis on the Dream market, an anonymous online market that uses cryptocurrency as transaction currency. We first collect data between October 30th 2018 and March 1st 2019. Then we use decision tree-based approach to classify goods. Following we analyze the category of goods sold in the market, the shipping place of vendors. By analyzing more than 1,970,303 items, we find the goods sold in Dream Market are mainly drugs and digital goods. We estimate the total sales of all vendors, and find that an average monthly income is $14 million during the measurement period, which means that the market commission income is more than $560,000 per month. Based on these data, we use transaction cost theory to analyze the transaction attributes of illegal transactions, which shows that anonymous online market can reduce transaction cost of illegal transactions. We finally discuss the results analyzed and the intervention policy, as well as recent DDoS attacks and future trends of illegal transactions in anonymous online market.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
7.
go back to reference Aldridge J, Décary-Hétu D (2014) Not an’ebay for drugs’: the cryptomarket’silk road’as a paradigm shifting criminal innovation. Available at SSRN 2436643 Aldridge J, Décary-Hétu D (2014) Not an’ebay for drugs’: the cryptomarket’silk road’as a paradigm shifting criminal innovation. Available at SSRN 2436643
8.
go back to reference Allodi L (2017) Economic factors of vulnerability trade and exploitation. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 1483–1499 Allodi L (2017) Economic factors of vulnerability trade and exploitation. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 1483–1499
9.
go back to reference Argyres N, Mayer KJ (2007) Contract design as a firm capability: an integration of learning and transaction cost perspectives. Acad Manag Rev 32(4):1060–1077CrossRef Argyres N, Mayer KJ (2007) Contract design as a firm capability: an integration of learning and transaction cost perspectives. Acad Manag Rev 32(4):1060–1077CrossRef
10.
go back to reference Christin N (2013) Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd international conference on World Wide Web. ACM, pp 213–224 Christin N (2013) Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd international conference on World Wide Web. ACM, pp 213–224
11.
go back to reference Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Tech. rep., Naval Research Lab Washington DC Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Tech. rep., Naval Research Lab Washington DC
12.
go back to reference Duxbury SW, Haynie DL (2017) The network structure of opioid distribution on a darknet cryptomarket. J Quant Criminol, 1–21 Duxbury SW, Haynie DL (2017) The network structure of opioid distribution on a darknet cryptomarket. J Quant Criminol, 1–21
13.
go back to reference Holt TJ, Smirnova O, Chua YT, Copes H (2015) Examining the risk reduction strategies of actors in online criminal markets. Global Crime 16(2):81–103CrossRef Holt TJ, Smirnova O, Chua YT, Copes H (2015) Examining the risk reduction strategies of actors in online criminal markets. Global Crime 16(2):81–103CrossRef
14.
go back to reference Holt TJ, Smirnova O, Hutchings A (2016) Examining signals of trust in criminal markets online. Journal of Cybersecurity 2(2):137–145 Holt TJ, Smirnova O, Hutchings A (2016) Examining signals of trust in criminal markets online. Journal of Cybersecurity 2(2):137–145
15.
go back to reference Kaplan EL, Meier P (1958) Nonparametric estimation from incomplete observations. J Am Stat Assoc 53 (282):457–481MathSciNetCrossRef Kaplan EL, Meier P (1958) Nonparametric estimation from incomplete observations. J Am Stat Assoc 53 (282):457–481MathSciNetCrossRef
16.
go back to reference Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and distributed systems security (NDSS) symposium 2019. NDSS Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and distributed systems security (NDSS) symposium 2019. NDSS
17.
go back to reference Leontiadis N, Moore T, Christin N (2011) Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: USENIX Security symposium, vol 11 Leontiadis N, Moore T, Christin N (2011) Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: USENIX Security symposium, vol 11
18.
go back to reference Leukfeldt R, Kleemans E, Stol W (2017) The use of online crime markets by cybercriminal networks: a view from within. Am Behav Sci 61(11):1387–1402CrossRef Leukfeldt R, Kleemans E, Stol W (2017) The use of online crime markets by cybercriminal networks: a view from within. Am Behav Sci 61(11):1387–1402CrossRef
19.
go back to reference McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D (2008) Shining light in dark places: Understanding the tor network. In: International symposium on privacy enhancing technologies symposium. Springer, pp 63–76 McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D (2008) Shining light in dark places: Understanding the tor network. In: International symposium on privacy enhancing technologies symposium. Springer, pp 63–76
20.
go back to reference Riordan MH, Williamson OE (1985) Asset specificity and economic organization. Int J Ind Organ 3 (4):365–378CrossRef Riordan MH, Williamson OE (1985) Asset specificity and economic organization. Int J Ind Organ 3 (4):365–378CrossRef
21.
go back to reference Soska K, Christin N (2015) Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: 24th {USENIX} security symposium ({USENIX} security 15), pp 33–48 Soska K, Christin N (2015) Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: 24th {USENIX} security symposium ({USENIX} security 15), pp 33–48
22.
go back to reference Van Wegberg R, Tajalizadehkhoob S, Soska K, Akyazi U, Ganan CH, Klievink B, Christin N, Van Eeten M (2018) Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In: 27th {USENIX} security symposium ({USENIX} security 18), pp 1009–1026 Van Wegberg R, Tajalizadehkhoob S, Soska K, Akyazi U, Ganan CH, Klievink B, Christin N, Van Eeten M (2018) Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In: 27th {USENIX} security symposium ({USENIX} security 18), pp 1009–1026
23.
go back to reference Van Wegberg R, Verburgh T (2018) Lost in the dream? measuring the effects of operation bayonet on vendors migrating to dream market. In: Proceedings of the evolution of the darknet workshop, pp 1–5 Van Wegberg R, Verburgh T (2018) Lost in the dream? measuring the effects of operation bayonet on vendors migrating to dream market. In: Proceedings of the evolution of the darknet workshop, pp 1–5
24.
go back to reference Williamson OE (1996) The mechanisms of governance. Oxford University Press, Oxford Williamson OE (1996) The mechanisms of governance. Oxford University Press, Oxford
25.
go back to reference Williamson OE (2007) Transaction cost economics: an introduction. Economics discussion paper (2007-3) Williamson OE (2007) Transaction cost economics: an introduction. Economics discussion paper (2007-3)
Metadata
Title
A Market in Dream: the Rapid Development of Anonymous Cybercrime
Authors
Gengqian Zhou
Jianwei Zhuge
Yunqian Fan
Kun Du
Shuqiang Lu
Publication date
01-02-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01440-2

Other articles of this Issue 1/2020

Mobile Networks and Applications 1/2020 Go to the issue