Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem

February 2011 saw the emergence of Silk Road, the first successful online anonymous marketplace, in which buyers and sellers could transact with anonymity properties far superior to those available in alternative online or offline means of commerce. Business on Silk Road, primarily involving narcotics trafficking, rapidly boomed, and competitors emerged. At the same time, law enforcement did not sit idle, and eventually managed to shut down Silk Road in October 2013 and arrest its operator. Far from causing the demise of this novel form of commerce, the Silk Road take-down spawned an entire, dynamic, online anonymous marketplace ecosystem, which has continued to evolve to this day. This paper presents a long-term measurement analysis of a large portion of this online anonymous marketplace ecosystem, including 16 different marketplaces, over more than two years (2013- 2015). By using long-term measurements, and combining our own data collection with publicly available previous efforts, we offer a detailed understanding of the growth of the online anonymous marketplace ecosystem. We are able to document the evolution of the types of goods being sold, and assess the effect (or lack thereof) of adversarial events, such as law enforcement operations or large-scale frauds, on the overall size of the economy. We also provide insights into how vendors are diversifying and replicating across marketplaces, and how vendor security practices (e.g., PGP adoption) are evolving. These different aspects help us understand how traditional, physical-world criminal activities are developing an online presence, in the same manner traditional commerce diversified online in the 1990s.

[1]  William J. Sutherland,et al.  Ecological census techniques: A handbook: Edited by William J. Sutherland Cambridge University Press, 1996. £75.00/$125.00 hbk, £27.95/$44.95 pbk (xv + 336 pages) ISBN 0 521 66135 5 / 367921 1 , 1997 .

[2]  Eric Wustrow,et al.  Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.

[3]  Chris Kanich,et al.  The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff , 2008, LEET.

[4]  M. Barratt,et al.  Use of Silk Road, the online drug marketplace, in the United Kingdom, Australia and the United States. , 2014, Addiction.

[5]  Stefan Savage,et al.  Juice: A Longitudinal Study of an SEO Botnet , 2013, NDSS.

[6]  Stefan Savage,et al.  A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.

[7]  Christian Louboutin,et al.  UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK , 2005 .

[8]  Martín Abadi,et al.  deSEO: Combating Search-Result Poisoning , 2011, USENIX Security Symposium.

[9]  J. Aldridge,et al.  Not an 'Ebay for Drugs': The Cryptomarket 'Silk Road' as a Paradigm Shifting Criminal Innovation , 2014 .

[10]  Tyler Moore,et al.  Fashion crimes: trending-term exploitation on the web , 2011, CCS '11.

[11]  Nicolas Christin,et al.  Dissecting one click frauds , 2010, CCS '10.

[12]  Christopher Krügel,et al.  Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.

[13]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.

[14]  William J. Sutherland,et al.  Ecological Census Techniques: Contents , 1996 .

[15]  Eastern District,et al.  UNITED STATES DISTRICT COURT , 1999 .

[16]  R. C. Turner,et al.  IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK , 1990 .

[17]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[18]  Lawrence K. Saul,et al.  Search + Seizure: The Effectiveness of Interventions on SEO Campaigns , 2014, Internet Measurement Conference.

[19]  Wenke Lee,et al.  SURF: detecting and measuring search poisoning , 2011, CCS '11.

[20]  Stefan Savage,et al.  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.

[21]  Zhou Li,et al.  Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections , 2014, 2014 IEEE Symposium on Security and Privacy.

[22]  He Liu,et al.  Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.

[23]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[24]  M. Van Hout,et al.  'Silk Road', the virtual drug marketplace: a single case study of user experiences. , 2013, The International journal on drug policy.

[25]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[26]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[27]  Arjen K. Lenstra,et al.  Ron was wrong, Whit is right , 2012, IACR Cryptol. ePrint Arch..

[28]  Diana S. Dolliver Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. , 2015, The International journal on drug policy.

[29]  E. Kaplan,et al.  Nonparametric Estimation from Incomplete Observations , 1958 .