Analyzing Illegal Trade On The Dark Web

Zaid Mundher

Abstract


Internet can be divided, in terms of accessibility, into three main categories: Surface web, Deep web, and Dark web. The dark part is considered the most dangerous of these types due to the difficulty of tracking its users and the anonymity it offers, making it widely used for illegal activities. This research aims to measure the prevalence of illegal activities in Iraq and some neighboring countries, specifically Syria, Saudi Arabia, and Iran. The activities tracked include: drug trafficking, fake documents, and weapons trafficking. The search engine "Ahmia" was used to collect dark web links (with the .onion extension) as an initial stage. In the second stage, the Tor network was used to access these links to obtain more information from each page. A dataset of approximately 5,000 pages was created and analyzed to generate a set of insights related to the data. The results showed that Iraq appears more prominently compared to neighboring countries, reflecting the widespread use of dark web sites, as will be discussed later in this work.


Keywords


Dark We, Cybercrime,Tor Network, Ahmia Search Engine, Community

Full Text:

PDF

References


M. K. Alshammery and A. F. Aljuboori, "Crawling and Mining the Dark Web: A Survey on Existing and New Approaches," *Iraqi Journal of Science*, vol. 63, no. 3, pp. 265–288, Mar. 2022, doi: 10.24996/ijs.2022.63.3.36.

J. Saleem, R. Islam, and M. A. Kabir, "The Anonymity of the Dark Web: A Survey," *IEEE Access*, vol. 10, pp. 1–1, Jan. 2022, doi: 10.1109/ACCESS.2022.3161547.

S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, "Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach," *IEEE Access*, vol. 8, pp. 171796–171819, Jan. 2020, doi: 10.1109/ACCESS.2020.3024198.

M. A. Alotaibi, M. A. AlZain, M. Masud, and J. Al-Amri, "Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection," *International Journal of Communication Networks and Information Security*, vol. 11, no. 3, Dec. 2019, doi: 10.17762/ijcnis.v11i3.4407.

S. Temara, "The Dark Web and Cybercrime: Identifying Threats and Anticipating Emerging Trends," *International Journal of Advanced Engineering Research and Science*, vol. 11, no. 10, pp. 80–93, Oct. 2024, doi: 10.22161/ijaers.1110.8.

I. Mahmood, M. Rahman, and M. A. Rahman, "A Survey on Dark Web Monitoring and Corresponding Threat Detection," 2022.

Ahmia.fi, "Ahmia Search Engine," 2014. [Online]. Available: https://ahmia.fi/. [Accessed: Aug. 20, 2025].

The Tor Project, "Tor Protocol Specifications," 2023. [Online]. Available: https://spec.torproject.org/. [Accessed: Aug. 20, 2025].

B. Yao, J. Zhu, P. Ma, K. Gao, and X. Ren, "A Constrained Louvain Algorithm with a Novel Modularity," *Applied Sciences*, vol. 13, no. 4045, 2023, doi: 10.3390/app13064045.

R. Saha, "Cybersecurity and the Dark Web," *International Journal of Research Publication and Reviews*, vol. 5, no. 3, pp. 2742–2746, Mar. 2024.

K. Soska and N. Christin, "Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem," in *Proc. 24th USENIX Security Symposium*, Washington, D.C., USA, 2015, pp. 33–48.

M. Tzanetakis, "Online drug distribution: alternatives to physical violence in conflict resolution," 2015, doi: 10.25365/phaidra.59.

M. Tzanetakis, "Comparing cryptomarkets for drugs: A characterisation of sellers and buyers over time," *International Journal of Drug Policy*, vol. 56, pp. 176–186, Jun. 2018, doi: 10.1016/j.drugpo.2018.01.022.

J. Aldridge and D. Décary-Hétu, "Hidden wholesale: The drug diffusing capacity of online drug cryptomarkets," *International Journal of Drug Policy*, vol. 35, pp. 7–15, May 2016, doi: 10.1016/j.drugpo.2016.04.020.

J. Sasikumar, "Dark Net Drug Transactions (DNDT): An Emerging Cryptotrend in Drug Trafficking," *Indian Journal of Criminology*, vol. 51, no. 1, 2023.

A. Bracci, M. Nadini, M. Aliapoulios, D. McCoy, I. Gray, A. Teytelboym, A. Gallo, and A. Baronchelli, "Dark Web Marketplaces and COVID-19: Before the Vaccine," *EPJ Data Science*, vol. 10, no. 1, Dec. 2021, doi: 10.1140/epjds/s13688-021-00259-w.

M. C. Ghanem, P. Mulvihill, K. Ouazzane, R. Djemai, and D. Dunsin, "D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities," *Journal of Cybersecurity and Privacy*, vol. 3, no. 4, pp. 808–829, Nov. 2023, doi: 10.3390/jcp3040036.

R. Raman, V. Nair, P. Nedungadi, I. Ray, and K. Achuthan, "Darkweb Research: Past, Present, and Future Trends and Mapping to Sustainable Development Goals," *Heliyon*, vol. 9, no. 9, e22269, Sep. 2023, doi: 10.1016/j.heliyon.2023.e22269.

P. Xia, Z. Yu, K. Wang, K. Ma, S. Chen, X. Luo, Y. Zhou, L. Wu, and G. Bai, "The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web," *arXiv preprint*, arXiv:2401.04662, Jan. 2024, doi: 10.48550/arXiv.2401.04662.

H. Isah, C. Neagu, and P. Trundle, "A Bipartite Network Model for Inferring Hidden Ties in Crime Data," *arXiv preprint*, arXiv:1510.02343, Oct. 2015.

K. He, Y. Li, S. Soundarajan, and J. Hopcroft, "Hidden Community Detection in Social Networks," *Information Sciences*, vol. 425, pp. 92–106, 2018, doi: 10.1016/j.ins.2017.10.019.

X. Su, S. Xue, F. Liu, J. Wu, J. Yang, C. Zhou, W. Hu, C. Paris, S. Nepal, D. Jin, Q. Sheng, and P. Yu, "A Comprehensive Survey on Community Detection With Deep Learning," *IEEE Transactions on Neural Networks and Learning Systems*, early access, pp. 1–21, 2022, doi:




DOI: https://doi.org/10.33387/ijeeic.v3i1.10851

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.



Journal PoliciesSubmissionsPeople
 Information

International Journal Of Electrical Engineering And Intelligent Computing

Departement of Electrical Engineering, Faculty of Engineering, Universitas Khairun,
Address: Yusuf Abdulrahman No. 53 (Gambesi) Ternate City - Indonesia
Email: ijeeic.unkhair@gmail.com
Creative Commons License
International Journal of Electrical Engineering and Intelligent Computing (IJEEIC)
, Universitas Khairun This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.