Javascript must be enabled to continue!
Secure in the Dark? An In-Depth Analysis of Dark Web Markets Security
View through CrossRef
Abstract
As the name implies, dark web markets – also commonly known as anonymous markets – have put in place measures for protecting the privacy of its users, both sellers and buyers, as this is a key priority that can attract users worldwide. With the rapid growth of dark web markets, competition between them has become more intense. In this environment, malicious attacks targeting competitors – for instance, aimed at reducing the availability of rivals' services – have also become more common. These attacks not only affect other services' availability and accessibility, but they may also lead to personal and private information being leaked. As such, it is understandable that dark web markets may want to implement strong security mechanisms to protect themselves and their users both from law enforcement and other operators. This is particularly true as good security can bea matter of survival but also help to gain a competitive edge over rivals. Although the literature has analysed and described dark web markets from multiple perspectives, there is still a gap in understanding the different security mechanisms they deploy. Furthermore, data collection – which is often considered a challenge in this research area – may be hindered by these very security mechanisms. Therefore, and in order to cover this gap, the study presented in this paper aims to investigate in depth the security mechanisms of various dark web markets. This will hopefully help to shed a brighter light on their operation. To achieve this, we performed data collection and experiments in twelve dark web markets. Although data collection practices may need to vary slightly for each market, all the data was collected over the span of four months, between May and August 2023. We found there are three main groups of security mechanisms in dark web markets: (i) those aimed towards increasing web security, (ii) those mostly aimed at improving account security, and (iii) those related to financial security. In addition, it is interesting to note that different types of security mechanisms on a given market may reflect the operator's business philosophy, technical knowledge and security posture, which in turn could have a big impact on the longevity, profitability and overall success of a particular market . The results of this study can help the academic and security research communities to understand the operation and evolution of dark web markets, hopefully to combat the crimes facilitated by these dark web markets more effectively. Additionally, findings in this study may provide some clues on how to improve the efficiency of data collection in this particularly hostile environment.
Title: Secure in the Dark? An In-Depth Analysis of Dark Web Markets Security
Description:
Abstract
As the name implies, dark web markets – also commonly known as anonymous markets – have put in place measures for protecting the privacy of its users, both sellers and buyers, as this is a key priority that can attract users worldwide.
With the rapid growth of dark web markets, competition between them has become more intense.
In this environment, malicious attacks targeting competitors – for instance, aimed at reducing the availability of rivals' services – have also become more common.
These attacks not only affect other services' availability and accessibility, but they may also lead to personal and private information being leaked.
As such, it is understandable that dark web markets may want to implement strong security mechanisms to protect themselves and their users both from law enforcement and other operators.
This is particularly true as good security can bea matter of survival but also help to gain a competitive edge over rivals.
Although the literature has analysed and described dark web markets from multiple perspectives, there is still a gap in understanding the different security mechanisms they deploy.
Furthermore, data collection – which is often considered a challenge in this research area – may be hindered by these very security mechanisms.
Therefore, and in order to cover this gap, the study presented in this paper aims to investigate in depth the security mechanisms of various dark web markets.
This will hopefully help to shed a brighter light on their operation.
To achieve this, we performed data collection and experiments in twelve dark web markets.
Although data collection practices may need to vary slightly for each market, all the data was collected over the span of four months, between May and August 2023.
We found there are three main groups of security mechanisms in dark web markets: (i) those aimed towards increasing web security, (ii) those mostly aimed at improving account security, and (iii) those related to financial security.
In addition, it is interesting to note that different types of security mechanisms on a given market may reflect the operator's business philosophy, technical knowledge and security posture, which in turn could have a big impact on the longevity, profitability and overall success of a particular market .
The results of this study can help the academic and security research communities to understand the operation and evolution of dark web markets, hopefully to combat the crimes facilitated by these dark web markets more effectively.
Additionally, findings in this study may provide some clues on how to improve the efficiency of data collection in this particularly hostile environment.
Related Results
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
KONTESTASI TASAWUF SUNNÎ DAN TASAWUF FALSAFÎ DI NUSANTARA
KONTESTASI TASAWUF SUNNÎ DAN TASAWUF FALSAFÎ DI NUSANTARA
<p>This article scrutinizes the history of Islamic development in Nusantara between 15th to 18th centuries, which has been colored from theological mysticism thought. Uniquel...
Web Mining for Public E-Services Personalization
Web Mining for Public E-Services Personalization
Over the last decade, we have witnessed an explosive growth in the information available on the Web. Today, Web browsers provide easy access to myriad sources of text and multimedi...
Web Mining for Public E-Services Personalization
Web Mining for Public E-Services Personalization
Over the last decade, we have witnessed an explosive growth in the information available on the Web. Today, Web browsers provide easy access to myriad sources of text and multimedi...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Analysis of vulnerabilities and security problems of web applications
Analysis of vulnerabilities and security problems of web applications
The article provides a comprehensive analysis of vulnerabilities, methods, tools and problems faced by web application security testing. The analysis of scientific research in the ...

