Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2736277.2741658acmotherconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods

Published: 18 May 2015 Publication History

Abstract

We investigate the practice of websites selling counterfeit goods. We inspect web search results for 225 queries across 25 brands. We devise a binary classifier that predicts whether a given website is selling counterfeits by examining automatically extracted features such as WHOIS information, pricing and website content. We then apply the classifier to results collected between January and August 2014. We find that, overall, 32% of search results point to websites selling fakes. For 'complicit' search terms, such as "replica rolex", 39% of the search results point to fakes, compared to 20% for 'innocent' terms, such as "hermes buy online". Using a linear regression, we find that brands with a higher street price for fakes have higher incidence of counterfeits in search results, but that brands who take active countermeasures such as filing DMCA requests experience lower incidence of counterfeits in search results. Finally, we study how the incidence of counterfeits evolves over time, finding that the fraction of search results pointing to fakes remains remarkably stable.

References

[1]
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair. A comparison of machine learning techniques for phishing detection. In Proceedings of the 2nd APWG eCrime Researchers Summit, pages 60--69. ACM, 2007.
[2]
G. A. Akerlof. The market for "lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84(3):488--500, 1970.
[3]
Alexa. Top 1 million websites. http://s3.amazonaws.com/alexa-static/top-1m.csv.zip.
[4]
R. Anderson. Why information security is hard -- an economic perspective. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'01), New Orleans, LA, Dec. 2001.
[5]
R. Anderson and T. Moore. The economics of information security. Science, 314(5799):610--613, Oct. 2006.
[6]
S. N. Bannur, L. K. Saul, and S. Savage. Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, pages 1--10. ACM, 2011.
[7]
A. Blum, B. Wardman, T. Solorio, and G. Warner. Lexical feature based phishing URL detection using online learning. In Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security, AISec '10, pages 54--60, New York, NY, USA, 2010. ACM.
[8]
D. Canali, M. Cova, G. Vigna, and C. Kruegel. Prophiler: a fast filter for the large-scale detection of malicious web pages. In Proceedings of the 20th international conference on World wide web, pages 197--206. ACM, 2011.
[9]
R. Clayton. WHOIS data extracted from templates (deft-whois), 2014. http://www.deft-whois.com.
[10]
R. Clayton and T. Mansfield. A study of WHOIS privacy and proxy service abuse. In 13th Workshop on the Economics of Information Security, 2014.
[11]
M. Culp, K. Johnson, and G. Michailidis. ada: An r package for stochastic boosting. Journal of Statistical Software, 17(2):9, 2006.
[12]
M. F. Der, L. K. Saul, S. Savage, and G. M. Voelker. Knock it off: Profiling the online storefronts of counterfeit merchandise. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '14, pages 1759--1768, New York, NY, USA, 2014. ACM.
[13]
J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi. deseo: Combating search-result poisoning. In USENIX Security Symposium. USENIX Association, 2011.
[14]
M. Kammerstetter, C. Platzer, and G. Wondracek. Vanity, cracks and malware: Insights into the anti-copy protection ecosystem. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 809--820, New York, NY, USA, 2012. ACM.
[15]
N. Leontiadis, T. Moore, and N. Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In USENIX Security Symposium, 2011.
[16]
N. Leontiadis, T. Moore, and N. Christin. Pick your poison: pricing and inventories at unlicensed online pharmacies. In Proceedings of the fourteenth ACM conference on Electronic commerce, pages 621--638. ACM, 2013.
[17]
N. Leontiadis, T. Moore, and N. Christin. A nearly four-year longitudinal study of search-engine poisoning. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 930--941, New York, NY, USA, 2014. ACM.
[18]
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click trajectories: End-to-end analysis of the spam value chain. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, pages 431--446, Washington, DC, USA, 2011. IEEE Computer Society.
[19]
C. Littlejohn, A. Baldacchino, F. Schifano, and P. Deluca. Internet pharmacies and online prescription drug sales: a cross-sectional study. Drugs: Education, Prevention, and Policy, 12(1):75--80, 2005.
[20]
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Beyond blacklists: learning to detect malicious web sites from suspicious urls. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1245--1254. ACM, 2009.
[21]
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. Voelker, S. Savage, and K. Levchenko. Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In USENIX Security Symposium, Bellevue, WA, Aug. 2012.
[22]
D. Meyer. Support vector machines. The Interface to libsvm in package e1071. e1071 Vignette, 2012.
[23]
T. Moore, N. Leontiadis, and N. Christin. Fashion crimes: trending-term exploitation on the web. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 455--466. ACM, 2011.
[24]
A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting spam web pages through content analysis. In Proceedings of the 15th international conference on World Wide Web, pages 83--92. ACM, 2006.
[25]
N. Provos, P. Mavrommatis, M. Rajab, and F. Monrose. All your iFrames point to us. In USENIX Security Symposium, Aug. 2008.
[26]
M. Riek, R. Böhme, and T. Moore. Measuring the influence of perceived cybercrime risk on online service avoidance. IEEE Transactions on Dependable and Secure Computing, (to appear), 2015.
[27]
G. Rodriguez. Generalized linear models, 2014. http://data.princeton.edu/R/glms.html.
[28]
M. D. Smith and R. Telang. Competing with free: The impact of movie broadcasts on DVD sales and Internet piracy. MIS Q., 33(2):321--338, June 2009.
[29]
D. Wang, S. Savage, and G. Voelker. Cloak and dagger: Dynamics of web search cloaking. In Proceedings of the 18th ACM Conference on Computer and Communications Security, pages 477--490. ACM, 2011.
[30]
D. Y. Wang, M. Der, M. Karami, L. Saul, D. McCoy, S. Savage, and G. M. Voelker. Search + seizure: The effectiveness of interventions on SEO campaigns. In Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pages 359--372, New York, NY, USA, 2014. ACM.
[31]
S. Webb, J. Caverlee, and C. Pu. Predicting web spam with HTTP session information. In Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM '08, pages 339--348, New York, NY, USA, 2008. ACM.

Cited By

View all
  • (2024)A signaling theory-based analysis of website features, investment perception and trust propensity in initial trust formation on unfamiliar small online retailersJournal of Marketing Theory and Practice10.1080/10696679.2024.2305454(1-22)Online publication date: 29-Jan-2024
  • (2024)Research on Credit Regulation Mechanism of E-commerce Platform Based on Evolutionary Game TheoryJournal of Systems Science and Systems Engineering10.1007/s11518-024-5603-2Online publication date: 22-Apr-2024
  • (2023)Double-Constrained Consensus Clustering with Application to Online Anti-CounterfeitingApplied Sciences10.3390/app13181005013:18(10050)Online publication date: 6-Sep-2023
  • Show More Cited By

Index Terms

  1. The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    WWW '15: Proceedings of the 24th International Conference on World Wide Web
    May 2015
    1460 pages
    ISBN:9781450334693

    Sponsors

    • IW3C2: International World Wide Web Conference Committee

    In-Cooperation

    Publisher

    International World Wide Web Conferences Steering Committee

    Republic and Canton of Geneva, Switzerland

    Publication History

    Published: 18 May 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. binary classifier
    2. counterfeit goods
    3. cybercrime measurement

    Qualifiers

    • Research-article

    Funding Sources

    • Department of Homeland Security (DHS) Science and Technology Directorate Cyber Security Division (DHS S&T/CSD)

    Conference

    WWW '15
    Sponsor:
    • IW3C2

    Acceptance Rates

    WWW '15 Paper Acceptance Rate 131 of 929 submissions, 14%;
    Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)71
    • Downloads (Last 6 weeks)12
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A signaling theory-based analysis of website features, investment perception and trust propensity in initial trust formation on unfamiliar small online retailersJournal of Marketing Theory and Practice10.1080/10696679.2024.2305454(1-22)Online publication date: 29-Jan-2024
    • (2024)Research on Credit Regulation Mechanism of E-commerce Platform Based on Evolutionary Game TheoryJournal of Systems Science and Systems Engineering10.1007/s11518-024-5603-2Online publication date: 22-Apr-2024
    • (2023)Double-Constrained Consensus Clustering with Application to Online Anti-CounterfeitingApplied Sciences10.3390/app13181005013:18(10050)Online publication date: 6-Sep-2023
    • (2023)Scamdog Millionaire: Detecting E-commerce Scams in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627184(29-43)Online publication date: 4-Dec-2023
    • (2023)Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179461(2566-2583)Online publication date: May-2023
    • (2023)The impact of capitalist profit-seeking behavior by online food delivery platforms on food safety risks and government regulation strategiesHumanities and Social Sciences Communications10.1057/s41599-023-01618-w10:1Online publication date: 25-Mar-2023
    • (2022)The Evolutionary Game Analysis and Simulation Research on E-Commerce Live Broadcast Counterfeit Sales with the Participation of a Third-Party SupervisorProceedings of the 2022 2nd International Conference on Education, Information Management and Service Science (EIMSS 2022)10.2991/978-94-6463-024-4_11(85-96)Online publication date: 29-Dec-2022
    • (2022)Development of Machine Learning Based Fraudulent Website Detection Scheme2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )10.1109/ICKII55100.2022.9983523(108-110)Online publication date: 22-Jul-2022
    • (2021)Fraudulent E-Commerce Websites Detection Through Machine LearningHybrid Artificial Intelligent Systems10.1007/978-3-030-86271-8_23(267-279)Online publication date: 22-Sep-2021
    • (2020)Type Inference for CACM Transactions on Programming Languages and Systems10.1145/342147242:3(1-71)Online publication date: 13-Nov-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media