Then and Now On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned

被引:14
作者
Allodi, Luca [1 ]
Corradin, Marco [2 ]
Massacci, Fabio [1 ]
机构
[1] Univ Trento, Dept Informat Engn & Comp Sci, I-38122 Trento, Italy
[2] Univ Twente, NL-7522 NB Enschede, Netherlands
关键词
Cybercrime; black markets; security economics;
D O I
10.1109/TETC.2015.2397395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrime activities are supported by infrastructures and services originating from an underground economy. The current understanding of this phenomenon is that the cybercrime economy ought to be fraught with information asymmetry and adverse selection problems. They should make the effects that we observe every day impossible to sustain. In this paper, we show that the market structure and design used by cyber criminals have evolved toward a market design that is similar to legitimate, thriving, online forum markets such as eBay. We illustrate this evolution by comparing the market regulatory mechanisms of two underground forum markets: 1) a failed market for credit cards and other illegal goods and 2) another, extremely active marketplace for vulnerabilities, exploits, and cyber attacks in general. The comparison shows that cybercrime markets evolved from unruly, scam for scammers market mechanisms to mature, regulated mechanisms that greatly favors trade efficiency.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 33 条
[1]   MARKET FOR LEMONS - QUALITY UNCERTAINTY AND MARKET MECHANISM [J].
AKERLOF, GA .
QUARTERLY JOURNAL OF ECONOMICS, 1970, 84 (03) :488-500
[2]   E-buyer beware: Why online auction fraud should be regulated [J].
Albert, MR .
AMERICAN BUSINESS LAW JOURNAL, 2002, 39 (04) :575-643
[3]  
Allodi L, 2013, P 6 USENIX WORKSH CY, P1
[4]   Comparing Vulnerability Severity and Exploits Using Case-Control Studies [J].
Allodi, Luca ;
Massacci, Fabio .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 17 (01)
[5]  
Anderson R., 2012, The Economics of Information Security and Privacy, P265
[6]  
[Anonymous], 18 SYM
[7]  
[Anonymous], 2012, P C COMP COMM SEC
[8]  
Calkins MM., 2001, Richmond Journal of Law and Technology, V7, P33
[9]  
Dagon D., 2006, P 13 NETW DISTR SYST, P1
[10]   AGENCY THEORY - AN ASSESSMENT AND REVIEW [J].
EISENHARDT, KM .
ACADEMY OF MANAGEMENT REVIEW, 1989, 14 (01) :57-74