{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:24:18Z","timestamp":1772119458712,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["101021801"],"award-info":[{"award-number":["101021801"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["101021801"],"award-info":[{"award-number":["101021801"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["101021801"],"award-info":[{"award-number":["101021801"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>As the name implies, dark web markets\u2014also commonly known as anonymous markets\u2014have put in place measures for protecting the privacy of its users, both sellers and buyers, as this is a key priority that can attract users worldwide. With the rapid growth of dark web markets, competition among them has become more intense. In this environment, malicious attacks targeting competitors\u2014for instance, aimed at reducing the availability of rivals\u2019 services\u2014have also become more common. These attacks not only affect other services\u2019 availability and accessibility, but they may also lead to personal and private information being leaked. As such, it is understandable that dark web markets may want to implement strong security mechanisms to protect themselves and their users from both law enforcement and other operators. This is particularly true as good security can be a matter of survival but also help to gain a competitive edge over rivals. Although the literature has analysed and described dark web markets from multiple perspectives, there is still a gap in the understanding of the different security mechanisms they deploy. Furthermore, data collection\u2014which is often considered a challenge in this research area\u2014may be hindered by these very security mechanisms. Therefore, and in order to cover this gap, the study presented in this paper aims to investigate in depth the security mechanisms of various dark web markets. This will hopefully help to shed a brighter light on their operation. To achieve this, we performed data collection and experiments in twelve dark web markets. Although data collection practices may need to vary slightly for each market, all the data was collected over the span of four months, between May and August 2023. We found there are three main groups of security mechanisms in dark web markets: (1) those aimed towards increasing web security, (2) those mostly aimed at improving account security, and (3) those related to financial security. In addition, it is interesting to note that different types of security mechanisms on a given market may reflect the operator\u2019s business philosophy, technical knowledge and security posture, which in turn could have a big impact on the longevity, profitability and overall success of a particular market. The results of this study can help the academic and security research communities to understand the operation and evolution of dark web markets, hopefully to combat the crimes facilitated by these dark web markets more effectively. Additionally, findings in this study may provide some clues on how to improve the efficiency of data collection in this particularly hostile environment.<\/jats:p>","DOI":"10.1007\/s10207-025-01015-1","type":"journal-article","created":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T05:20:04Z","timestamp":1743830404000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure in the dark? An in-depth analysis of dark web markets security"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-3690","authenticated-orcid":false,"given":"Yichao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1830-1587","authenticated-orcid":false,"given":"Budi","family":"Arief","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6432-5328","authenticated-orcid":false,"given":"Julio","family":"Hernandez-Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"key":"1015_CR1","doi-asserted-by":"crossref","unstructured":"Audran, D., Andersen, M., Hansen, M., Andersen, M., Frederiksen, T., Hansen, K., Georgoulias, D., Vasilomanolakis, E.: Tick tock break the clock: Breaking captchas on the darkweb. In: Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT, pp. 357\u2013365. INSTICC, SciTePress, Lisbon, Portugal (2022). https:\/\/www.scitepress.org\/PublishedPapers\/2022\/112733\/112733.pdf","DOI":"10.5220\/0011273300003283"},{"key":"1015_CR2","doi-asserted-by":"publisher","unstructured":"Ben\u00a0Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474 (2014). https:\/\/doi.org\/10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"1015_CR3","doi-asserted-by":"publisher","first-page":"35914","DOI":"10.1109\/ACCESS.2023.3255165","volume":"11","author":"J Bergman","year":"2023","unstructured":"Bergman, J., Popov, O.B.: Exploring dark web crawlers: a systematic literature review of dark web crawlers and their implementation. IEEE Access 11, 35914\u201335933 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3255165","journal-title":"IEEE Access"},{"key":"1015_CR4","doi-asserted-by":"publisher","unstructured":"Bhalerao, R., Aliapoulios, M., Shumailov, I., Afroz, S., McCoy, D.: Mapping the underground: Supervised discovery of cybercrime supply chains. In: 2019 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201316. IEEE, Pittsburgh, PA, USA (2019). https:\/\/doi.org\/10.1109\/eCrime47957.2019.9037582","DOI":"10.1109\/eCrime47957.2019.9037582"},{"key":"1015_CR5","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201914, pp. 15\u201429. Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"issue":"1","key":"1015_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1140\/epjds\/s13688-021-00259-w","volume":"10","author":"A Bracci","year":"2021","unstructured":"Bracci, A., Nadini, M., Aliapoulios, M., McCoy, D., Gray, I., Teytelboym, A., Gallo, A., Baronchelli, A.: Dark web marketplaces and covid-19: before the vaccine. EPJ Data Sci. 10(1), 6 (2021). https:\/\/doi.org\/10.1140\/epjds\/s13688-021-00259-w","journal-title":"EPJ Data Sci."},{"key":"1015_CR7","unstructured":"Burnhill, E.: Man charged with money laundering of cryptocurrencies (2024). https:\/\/www.rte.ie\/news\/ireland\/2024\/0808\/1463995-cryptocurrencies\/"},{"key":"1015_CR8","doi-asserted-by":"publisher","unstructured":"Campobasso, M., Allodi, L.: Threat\/crawl: a trainable, highly-reusable, and extensible automated method and tool to crawl criminal underground forums. In: 2022 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE, Boston, MA, USA (2022). https:\/\/doi.org\/10.1109\/eCrime57793.2022.10142081","DOI":"10.1109\/eCrime57793.2022.10142081"},{"key":"1015_CR9","doi-asserted-by":"publisher","unstructured":"Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, WWW \u201913, pp. 213\u2013224. Association for Computing Machinery, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2488388.2488408","DOI":"10.1145\/2488388.2488408"},{"key":"1015_CR10","unstructured":"Conrad, B., Shirazi, F.: A survey on tor and i2p. In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), pp. 22\u201328 (2014). http:\/\/i2p2.de\/_static\/pdf\/icimp_2014_1_40_30015.pdf"},{"issue":"8","key":"1015_CR11","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1080\/01639625.2019.1596465","volume":"41","author":"C Copeland","year":"2020","unstructured":"Copeland, C., Wallin, M., Holt, T.J.: Assessing the practices and products of darkweb firearm vendors. Deviant Behav. 41(8), 949\u2013968 (2020). https:\/\/doi.org\/10.1080\/01639625.2019.1596465","journal-title":"Deviant Behav."},{"issue":"3","key":"1015_CR12","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11416-021-00380-4","volume":"17","author":"B David","year":"2021","unstructured":"David, B., Delong, M., Filiol, E.: Detection of crawler traps: formalization and implementation-defeating protection on internet and on the tor network. J. Comput. Virol. Hack. Tech. 17(3), 185\u2013198 (2021). https:\/\/doi.org\/10.1007\/s11416-021-00380-4","journal-title":"J. Comput. Virol. Hack. Tech."},{"key":"1015_CR13","unstructured":"Ehlert, M.: I2p usability vs. tor usability a bandwidth and latency comparison. In: Seminar Report, Humboldt University of Berlin, pp. 129\u2013134 (2011). https:\/\/www.freehaven.net\/anonbib\/cache\/ehlert2011:usability-comparison-i2p-tor.pdf"},{"issue":"1","key":"1015_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-74416-y","volume":"10","author":"A ElBahrawy","year":"2020","unstructured":"ElBahrawy, A., Alessandretti, L., Rusnac, L., Goldsmith, D., Teytelboym, A., Baronchelli, A.: Collective dynamics of dark web marketplaces. Sci. Rep. 10(1), 1\u20138 (2020). https:\/\/doi.org\/10.1038\/s41598-020-74416-y","journal-title":"Sci. Rep."},{"key":"1015_CR15","unstructured":"Europol: 288 dark web vendors arrested in major marketplace seizure (2023). https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/288-dark-web-vendors-arrested-in-major-marketplace-seizure"},{"key":"1015_CR16","unstructured":"Europol: Internet organised crime assessment (iocta) 2023 (2023). https:\/\/www.europol.europa.eu\/cms\/sites\/default\/files\/documents\/IOCTA"},{"key":"1015_CR17","unstructured":"Gatlan, S.: Tor and i2p networks hit by wave of ongoing ddos attacks (2023). https:\/\/www.bleepingcomputer.com\/news\/security\/tor-and-i2p-networks-hit-by-wave-of-ongoing-ddos-attacks\/"},{"key":"1015_CR18","doi-asserted-by":"publisher","unstructured":"Georgoulias, D., Pedersen, J.M., Falch, M., Vasilomanolakis, E.: A qualitative mapping of darkweb marketplaces. In: 2021 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201315. IEEE, Boston, MA, USA (2021). https:\/\/doi.org\/10.1109\/eCrime54498.2021.9738766","DOI":"10.1109\/eCrime54498.2021.9738766"},{"key":"1015_CR19","doi-asserted-by":"publisher","unstructured":"Georgoulias, D., Pedersen, J.M., Falch, M., Vasilomanolakis, E.: Botnet business models, takedown attempts, and the darkweb market: A survey. ACM Comput. Surv. 55(11) (2023). https:\/\/doi.org\/10.1145\/3575808","DOI":"10.1145\/3575808"},{"key":"1015_CR20","doi-asserted-by":"publisher","unstructured":"Georgoulias, D., Yaben, R., Vasilomanolakis, E.: Cheaper than you thought? a dive into the darkweb market of cyber-crime products. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES \u201923. Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3600160.3605012","DOI":"10.1145\/3600160.3605012"},{"key":"1015_CR21","doi-asserted-by":"publisher","unstructured":"G\u00fcldenring, B., Roth, V.: Protecting onion service users against phishing. arXiv preprint arXiv:2408.07787 (2024). https:\/\/doi.org\/10.48550\/arXiv.2408.07787","DOI":"10.48550\/arXiv.2408.07787"},{"key":"1015_CR22","doi-asserted-by":"publisher","unstructured":"Hutchings, A., Clayton, R., Anderson, R.: Taking down websites to prevent crime. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201310. IEEE, Toronto, ON, Canada (2016). https:\/\/doi.org\/10.1109\/ECRIME.2016.7487947","DOI":"10.1109\/ECRIME.2016.7487947"},{"key":"1015_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-030-55343-2_4","volume-title":"Dark Web Markets","author":"E Kermitsis","year":"2021","unstructured":"Kermitsis, E., Kavallieros, D., Myttas, D., Lissaris, E., Giataganas, G.: Dark Web Markets, pp. 85\u2013118. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55343-2_4"},{"key":"1015_CR24","doi-asserted-by":"publisher","unstructured":"Labrador, V., Pastrana, S.: Examining the trends and operations of modern dark-web marketplaces. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 163\u2013172. IEEE, Genoa, Italy (2022).https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00022","DOI":"10.1109\/EuroSPW55150.2022.00022"},{"key":"1015_CR25","unstructured":"Moore, A.: Man charged over \u20ac 6.5m cryptocurrency seizure in dublin (2024). https:\/\/www.bbc.co.uk\/news\/articles\/cql3vx15e2wo"},{"key":"1015_CR26","unstructured":"National Crime Agency: Child sexual abuse and exploitation (2023). https:\/\/www.nationalcrimeagency.gov.uk\/what-we-do\/crime-threats\/child-sexual-abuse-and-exploitation"},{"key":"1015_CR27","doi-asserted-by":"publisher","unstructured":"Pastrana, S., Hutchings, A., Caines, A., Buttery, P.: Characterizing eve: Analysing cybercrime actors in a large underground forum. In: Research in Attacks, Intrusions, and Defenses, pp. 207\u2013227. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_10","DOI":"10.1007\/978-3-030-00470-5_10"},{"key":"1015_CR28","unstructured":"Tidy, J.: Hydra: How german police dismantled russian darknet site (2022). https:\/\/www.bbc.co.uk\/news\/technology-61002904"},{"key":"1015_CR29","unstructured":"Tor Project: Network ddos (2023). https:\/\/status.torproject.org\/issues\/2022-06-09-network-ddos\/"},{"key":"1015_CR30","doi-asserted-by":"publisher","unstructured":"Turk, K., Pastrana, S., Collier, B.: A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 428\u2013437. IEEE, Genoa, Italy (2020).https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00064","DOI":"10.1109\/EuroSPW51379.2020.00064"},{"key":"1015_CR31","unstructured":"U.S. Attorney\u2019s Office: \u201cincognito market\u201d\u2019 owner arrested for operating one of the largest illegal narcotics marketplaces on the internet (2024). https:\/\/www.justice.gov\/usao-sdny\/pr\/incognito-market-owner-arrested-operating-one-largest-illegal-narcotics-marketplaces"},{"key":"1015_CR32","unstructured":"Van\u00a0Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Ga\u00f1\u00e1n, C., Klievink, B., Christin, N., Van\u00a0Eeten, M.: Plug and prey? measuring the commoditization of cybercrime via online anonymous markets. In: Proceedings of the 27th USENIX Conference on Security Symposium, SEC\u201918, pp. 1009\u20131026. USENIX Association, USA (2018). https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-van_wegberg.pdf"},{"key":"1015_CR33","doi-asserted-by":"publisher","unstructured":"Wang, Y., Arief, B., Franqueira, V.N.L., Coates, A.G., \u00d3\u00a0Ciardha, C.: Investigating the availability of child sexual abuse materials in dark web markets: Evidence gathered and lessons learned. In: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, EICC \u201923, pp. 59\u201364. Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3590777.3590812","DOI":"10.1145\/3590777.3590812"},{"key":"1015_CR34","doi-asserted-by":"publisher","unstructured":"Wang, Y., Arief, B., Hernandez-Castro, J.: Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. In: 2021 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201313. IEEE, IEEE, Boston, MA, USA (2021). https:\/\/doi.org\/10.1109\/eCrime54498.2021.9738745","DOI":"10.1109\/eCrime54498.2021.9738745"},{"key":"1015_CR35","doi-asserted-by":"publisher","unstructured":"Wang, Y., Arief, B., Hernandez-Castro, J.: Dark ending: What happens when a dark web market closes down. In: Proceedings of the 9th International Conference on Information Systems Security and Privacy - ICISSP, pp. 106\u2013117. INSTICC, SciTePress, Lisbon, Portugal (2023). https:\/\/doi.org\/10.5220\/0011681600003405","DOI":"10.5220\/0011681600003405"},{"key":"1015_CR36","doi-asserted-by":"publisher","unstructured":"Wu, L., Hu, Y., Zhou, Y., Wang, H., Luo, X., Wang, Z., Zhang, F., Ren, K.: Towards understanding and demystifying bitcoin mixing services. In: Proceedings of the Web Conference 2021, WWW \u201921, p. 33-44. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3442381.3449880","DOI":"10.1145\/3442381.3449880"},{"key":"1015_CR37","doi-asserted-by":"publisher","unstructured":"Yannikos, Y., Heeger, J., Steinebach, M.: Data acquisition on a large darknet marketplace. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES \u201922. ACM, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3538969.3544472","DOI":"10.1145\/3538969.3544472"},{"key":"1015_CR38","doi-asserted-by":"publisher","unstructured":"Yoon, C., Kim, K., Kim, Y., Shin, S., Son, S.: Doppelg\u00e4ngers on the dark web: A large-scale assessment on phishing hidden web services. In: The World Wide Web Conference, WWW \u201919, p. 2225-2235. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3308558.3313551","DOI":"10.1145\/3308558.3313551"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01015-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01015-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01015-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T06:10:57Z","timestamp":1750486257000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01015-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,3]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1015"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01015-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5010611\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,3]]},"assertion":[{"value":"3 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work was partly supported by the funding received from the European Commission under the Horizon 2020 Programme (H2020) through the HEROES project (\n                      \n                      , Grant Agreement no. 101021801). In particular, Y.W. received travel funding to present the original paper at the 2024 European Interdisciplinary Cybersecurity Conference (EICC\u00a0\u201924). B.A. and Y.W. are colleagues of one of the Special Issue Editors (S.L.), while J.H-C. is a former colleague of S.L. Additionally, B.A. collaborated with one of the other Special Issue Editors (M.S.) as Programme Committee Co-Chairs of a conference in 2023.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"107"}}