Trade Analysis and Prediction in Dark web
DOI:
https://doi.org/10.61841/d821qy08Keywords:
dark net, dark net markets,, illegal trading, cryptocurrency, AgoraAbstract
The non-referenced web is estimated five hundred times the width of the web's surface. Dark web accounts for about a few percentage of the anonymous web and contains all types of criminal activities: drug trafficking, counterfeiting, hacking, etc. Dark Net Markets (DNM) are e- markets usually hosted as Tor hidden networks offering escrow services between buyers and sellers trading in Bit coin or other crypt currencies, usually for marketing of drugs or related illegal/regulated goods; Agora was one of the most common DNMs. Agora was a dark net market that hosts on the Tor network itself, launched in 2013 and due to some reasons it was shut down in August 2015. In this paper we propose analyzing and predicting the trade in a particular Dark Web Market (Agora) using neural networks
Downloads
References
[1] Othmane Cherqi, Ghita Mezzour, Mounir Ghogho , Mohammed El Koutbi“ Analysis of Hacking Related Trade in the Darkweb” Published in 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).
[2] Eric Nunes, Paulo Shakarian,Gerardo I. Simari “At-Risk System Identification via Analysis of Discussions on the Darkweb” Published in 2018 APWG Symposium on Electronic Crime Research (eCrime).
[3] Ericsson Marin, Ahmad Diab and Paulo Shakarian “Product Offerings in Malicious Hacker Markets” published in 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[4] Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre, and Ivan de Paz “Classifying Illegal Activities on Tor Network Based on Web Textual Contents” published in 2017 Association for Computational Linguistics
[5] Andres Baravalle, Mauro Sanchez Lopez, Sin Wee Lee “Mining the Dark Web: Drugs and Fake Ids” published in 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)
[6] Massimo La Morgia, Alessandro Mei, Simone Raponi, Julinda Stefa “Time-Zone Geolocation of Crowds in the Dark Web” published in 2018 IEEE 38th International Conference on Distributed Computing Systems
[7] Robert Koch “Hidden in the Shadow: The Dark Web – A Growing Risk for Military Operations?” publishded in 2019 11th International Conference on Cyber Conflict
[8] Faizan and Raees Ahmad Khan “Exploring and analyzing the dark Web: A new alchemy” published in 2018
[9] Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian ”Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence” Published in 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[10] Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Jana Shakarian, Paulo Shakarian “Predicting Hacker Adoption on Darkweb Forums” published in 2018 IEEE Intl Conf on Parallel & Distributed Processing.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
