Skip to main content
Top

2018 | OriginalPaper | Chapter

Tor Black Markets: Economics, Characterization and Investigation Technique

Authors : Gianluigi Me, Liberato Pesticcio

Published in: Cyber Criminology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cyber threat is highly dynamic and evolves in parallel with the innovation of systems and communications, which are outside the control of government authorities and respond exclusively to business logic and free initiative, often contingent on implementation of illegal activities. In particular, the threat posed by the criminal use of the Internet goes far beyond the cybercrime, especially with the Tor network, where black markets are shifted with the shape of renown legal marketplaces as Ebay and Amazon. Hence even common crime can benefit of new modus operandi and new routes to deliver illegal goods or services, enforcing new investigation techniques to Law Enforcement Agencies (LEAs). This paper formerly analyses the goods/services categories of fourteen Tor marketplaces and the related vendors, while the last one provides a discussion on a novel investigative technique related to PGP Keys inter-relations. In particular, with the evolution/growth of the markets, the vendors are increasingly adopting open source tools and technologies, as PGP, which can be exploited to infer information such as the established relationships between users. This public information about the keys can be used to retrace social network of entities connected by PGP relationship and apply well-established graph analysis techniques. Finally, the paper analyses the strength and weaknesses of proposed methods, depicting future research directions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Allodi, L., Corradin, M., & Massacci, F. (2016). Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing, 4(1), 35–46.CrossRef Allodi, L., Corradin, M., & Massacci, F. (2016). Then and now: On the maturity of the cybercrime markets the lesson that black-hat marketeers learned. IEEE Transactions on Emerging Topics in Computing, 4(1), 35–46.CrossRef
go back to reference Barabasi, A., & Albert, L. R. (1999). Analyzing social networks. In Emergence of scaling in random networks (p. 509512). Barabasi, A., & Albert, L. R. (1999). Analyzing social networks. In Emergence of scaling in random networks (p. 509512).
go back to reference Berte, R., Lentini, A., Me, G., et al. (2009). Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm. International Journal of Electronic Security and Digital Forensics (IJESDF), 2. online. Berte, R., Lentini, A., Me, G., et al. (2009). Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm. International Journal of Electronic Security and Digital Forensics (IJESDF), 2. online.
go back to reference Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: SAGE. Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: SAGE.
go back to reference Celestini, A., & Me, G. (2016). Tor marketplaces exploratory data analysis: The drugs case (J. Hamid, C. Alex, E. David, H.-F. Amin, B. Guy, S. Graham, J. Arshad, Eds.), (pp. 218–229). Celestini, A., & Me, G. (2016). Tor marketplaces exploratory data analysis: The drugs case (J. Hamid, C. Alex, E. David, H.-F. Amin, B. Guy, S. Graham, J. Arshad, Eds.), (pp. 218–229).
go back to reference Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The secondgeneration onion router (Technical report, DTIC document). Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The secondgeneration onion router (Technical report, DTIC document).
go back to reference Firmani, D., Italiano, G. F., & Laura, L. (2014). The (not so) critical nodes of criminal networks. In International conference on social informatics (pp. 87–96). Springer. Firmani, D., Italiano, G. F., & Laura, L. (2014). The (not so) critical nodes of criminal networks. In International conference on social informatics (pp. 87–96). Springer.
go back to reference Herley, C., & Florencio, D. A. F. (2009). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In Proceedings (online) of the Workshop on Economics of Information Security (WEIS). Herley, C., & Florencio, D. A. F. (2009). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In Proceedings (online) of the Workshop on Economics of Information Security (WEIS).
go back to reference Kolaczyk, E. (2009). Statistical analysis of network data: Methods andmodels (Springer Series in Statistics, p. 386).CrossRef Kolaczyk, E. (2009). Statistical analysis of network data: Methods andmodels (Springer Series in Statistics, p. 386).CrossRef
go back to reference Schnettler, S. (2009). A structured overview of 50 years of small-world research. Social Networks, 31(3), 165–178.CrossRef Schnettler, S. (2009). A structured overview of 50 years of small-world research. Social Networks, 31(3), 165–178.CrossRef
go back to reference Smith, P. (1994). Assessing the size of the underground economy: the canadian statistical perspectives. Canadian Economic Observer, 3, 16–33 Catalogue No. 11-010. Smith, P. (1994). Assessing the size of the underground economy: the canadian statistical perspectives. Canadian Economic Observer, 3, 16–33 Catalogue No. 11-010.
go back to reference Soska, K. & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. Soska, K. & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem.
go back to reference Thomas, K., Yuxing, D., David, H., Elie, W., Grier, B. C., Holt, T. J., Kruegel, C., Mccoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization.In IProceedings (online) of the Workshop on Economics of Information Security (WEIS). Thomas, K., Yuxing, D., David, H., Elie, W., Grier, B. C., Holt, T. J., Kruegel, C., Mccoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization.In IProceedings (online) of the Workshop on Economics of Information Security (WEIS).
go back to reference Van Hout, M. C., & Bingham, T. (2013). Surfing the silk road: A study of users experiences. International Journal of Drug Policy, 24(6), 524–529.CrossRef Van Hout, M. C., & Bingham, T. (2013). Surfing the silk road: A study of users experiences. International Journal of Drug Policy, 24(6), 524–529.CrossRef
go back to reference Warren, R., Wilkinson, D., & Warnecke M. (2006). Empirical analysis of a dynamic social network built from pgp keyrings. In iCML’06 Proceedings of the 2006 conference on statistical network analysis (pp. 158–171). Warren, R., Wilkinson, D., & Warnecke M. (2006). Empirical analysis of a dynamic social network built from pgp keyrings. In iCML’06 Proceedings of the 2006 conference on statistical network analysis (pp. 158–171).
go back to reference Zubcsek, P. P., Chowdhury, I., & Katona, Z. (2014). Information communities: the network structure of communication. Social Networks, 38, 50–62.CrossRef Zubcsek, P. P., Chowdhury, I., & Katona, Z. (2014). Information communities: the network structure of communication. Social Networks, 38, 50–62.CrossRef
Metadata
Title
Tor Black Markets: Economics, Characterization and Investigation Technique
Authors
Gianluigi Me
Liberato Pesticcio
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-97181-0_6

Premium Partner