Folex: An analysis of an herbal and counterfeit luxury goods affiliate program

Mohammad Karami, Shiva Ghaemi, Damon McCoy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The profitability of the underground criminal business of counterfeit or unauthorized products is a major funding source that drives the illegal online advertisement industry. While it is clear that underground online affiliate-based programs are profitable for their owners, the precise business operations of such organizations are unknown to a large extent. In this study, we present the results of our analysis of a replica and herbal supplements affiliate program based on leaked ground truth data. The dataset covers a period of over two years and includes more than $6 million in sale records for an affiliate program known as Tower of Power (TowPow) focusing on the herbal supplements and counterfeit luxury goods market. In this paper we provide a detailed empirical analysis of the participating affiliates, sales dynamics, revenue sharing, domain usage patterns and conversion rates.

    Original languageEnglish (US)
    Title of host publication2013 APWG eCrime Researchers Summit, eCRS 2013
    PublisherIEEE Computer Society
    ISBN (Print)9781479911585
    DOIs
    StatePublished - 2013
    Event2013 APWG eCrime Researchers Summit, eCRS 2013 - San Francisco, CA, United States
    Duration: Sep 17 2013Sep 18 2013

    Publication series

    NameeCrime Researchers Summit, eCrime
    ISSN (Print)2159-1237
    ISSN (Electronic)2159-1245

    Other

    Other2013 APWG eCrime Researchers Summit, eCRS 2013
    Country/TerritoryUnited States
    CitySan Francisco, CA
    Period9/17/139/18/13

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Information Systems
    • Information Systems and Management

    Fingerprint

    Dive into the research topics of 'Folex: An analysis of an herbal and counterfeit luxury goods affiliate program'. Together they form a unique fingerprint.

    Cite this