Illicit Activity Detection in Bitcoin Transactions using Timeseries Analysis

被引:0
|
作者
Maheshwari, Rohan [1 ]
Praveen, V. A. Sriram [1 ]
Shobha, G. [1 ]
Shetty, Jyoti [1 ]
Chala, Arjuna [2 ]
Watanuki, Hugo [2 ]
机构
[1] R V Coll Engn, Comp Sci & Engn Dept, Bengaluru, India
[2] HPCC Syst LexisNexis Risk Solut, Alpharetta, GA USA
关键词
Bitcoin; time-series analysis; HPCC systems; random time interval; illicit activity detection;
D O I
10.14569/IJACSA.2023.0140302
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key motivator for the usage of cryptocurrency such as bitcoin in illicit activity is the degree of anonymity provided by the alphanumeric addresses used in transactions. This however does not mean that anonymity is built into the system as the transactions being made are still subject to the human element. Additionally, there is around 400 Gigabytes of raw data available in the bitcoin blockchain, making it a big data problem. HPCC Systems is used in this research, which is a data intensive, open source, big data platform. This paper attempts to use timing data produced by taking the time intervals between consecutive transactions performed by an address and make an Kolmogorov-Smirnov test, Anderson-Darling test and Cramer -von Mises criterion, two addresses are compared to find if they are from the same source. The BABD-13 dataset was used as a source of illegal addresses, which provided both references and test data points. The research shows that time-series data can be used to represent transactional behaviour of a user and the algorithm proposed is able to identify different addresses originating from the same user or users engaging in similar activity.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [21] A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
    Bistarelli, Stefano
    Mercanti, Ivan
    Santini, Francesco
    EURO-PAR 2018: PARALLEL PROCESSING WORKSHOPS, 2019, 11339 : 329 - 341
  • [22] Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis
    Wahrstaetter, Anton
    Taudes, Alfred
    Svetinovic, Davor
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4543 - 4558
  • [23] Leveraging the Users Graph and Trustful Transactions for the Analysis of Bitcoin Price
    Crowcroft, Jon
    Maesa, Damiano Di Francesco
    Magrini, Alessandro
    Marino, Andrea
    Ricci, Laura
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1338 - 1352
  • [24] Short Paper: An Analysis of Non-standard Bitcoin Transactions
    Bistarelli, Stefano
    Mercanti, Ivan
    Santini, Francesco
    2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, : 93 - 96
  • [25] TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
    Delgado-Segura, Sergi
    Bakshi, Surya
    Perez-Sola, Cristina
    Litton, James
    Pachulski, Andrew
    Miller, Andrew
    Bhattacharjee, Bobby
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 550 - 566
  • [26] Deanonymizing Tor hidden service users through Bitcoin transactions analysis
    Al Jawaheri, Husam
    Al Sabah, Mashael
    Boshmaf, Yazan
    Erbad, Aiman
    COMPUTERS & SECURITY, 2020, 89
  • [27] Is Bitcoin Future as Secure asWe Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
    Ebrahimpour, Ghader
    Haghighi, Mohammad Sayad
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [28] Tracking Bitcoin Users Activity Using Community Detection on a Network of Weak Signals
    Remy, Cazabet
    Rym, Baccour
    Matthieu, Latapy
    COMPLEX NETWORKS & THEIR APPLICATIONS VI, 2018, 689 : 166 - 177
  • [29] BitPredict: End-to-End Context-Aware Detection of Anomalies in Bitcoin Transactions using Stack Model Network
    Snigdha, K.
    Reddy, P. Sree Navya
    Hema, Deva
    Gayathri, S.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [30] Intrusion Detection and Mitigation System Using Blockchain Analysis for Bitcoin Exchange
    Kim, Suah
    Kim, Beomjoong
    Kim, Hyoung Joong
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTERNET OF THINGS (CCIOT 2018), 2018, : 40 - 44