Illicit Activity Detection in Bitcoin Transactions using Timeseries Analysis

被引:0
|
作者
Maheshwari, Rohan [1 ]
Praveen, V. A. Sriram [1 ]
Shobha, G. [1 ]
Shetty, Jyoti [1 ]
Chala, Arjuna [2 ]
Watanuki, Hugo [2 ]
机构
[1] R V Coll Engn, Comp Sci & Engn Dept, Bengaluru, India
[2] HPCC Syst LexisNexis Risk Solut, Alpharetta, GA USA
关键词
Bitcoin; time-series analysis; HPCC systems; random time interval; illicit activity detection;
D O I
10.14569/IJACSA.2023.0140302
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key motivator for the usage of cryptocurrency such as bitcoin in illicit activity is the degree of anonymity provided by the alphanumeric addresses used in transactions. This however does not mean that anonymity is built into the system as the transactions being made are still subject to the human element. Additionally, there is around 400 Gigabytes of raw data available in the bitcoin blockchain, making it a big data problem. HPCC Systems is used in this research, which is a data intensive, open source, big data platform. This paper attempts to use timing data produced by taking the time intervals between consecutive transactions performed by an address and make an Kolmogorov-Smirnov test, Anderson-Darling test and Cramer -von Mises criterion, two addresses are compared to find if they are from the same source. The BABD-13 dataset was used as a source of illegal addresses, which provided both references and test data points. The research shows that time-series data can be used to represent transactional behaviour of a user and the algorithm proposed is able to identify different addresses originating from the same user or users engaging in similar activity.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [31] Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods
    Lee, Chaehyeon
    Maharjan, Sajan
    Ko, Kyungchan
    Hong, James Won-Ki
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 520 - 533
  • [32] Identification of High Yielding Investment Programs in Bitcoin via Transactions Pattern Analysis
    Toyoda, Kentaroh
    Ohtsuki, Tomoaki
    Mathiopoulos, P. Takis
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [33] Analysis of multi-input multi-output transactions in the Bitcoin network
    Phetsouvanh, Silivanxay
    Datta, Anwitaman
    Oggier, Frederique
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (01):
  • [34] A New Framework for Fraud Detection in Bitcoin Transactions Through Ensemble Stacking Model in Smart Cities
    Nayyer, Noor
    Javaid, Nadeem
    Akbar, Mariam
    Aldegheishem, Abdulaziz
    Alrajeh, Nabil
    Jamil, Mohsin
    IEEE ACCESS, 2023, 11 : 90916 - 90938
  • [35] ANALYSIS OF HUMAN HIP MOVEMENT USING NONLINEAR TIMESERIES ANALYSIS METHODS
    Georgescu, Marius
    Tarnita, Daniela
    Dumitru, Ilie
    Petcu, Alin
    Vaduva, Razvan
    Marghitu, Dan
    ACTA TECHNICA NAPOCENSIS SERIES-APPLIED MATHEMATICS MECHANICS AND ENGINEERING, 2021, 64 (01): : 335 - 344
  • [36] Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution
    Singh, Prabhjot
    Chandavarkar, B. R.
    Arora, Srishti
    Agrawal, Neha
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 193 - 198
  • [37] An Automatic Detection and Analysis of the Bitcoin Generator Scam
    Badawi, Emad
    Jourdan, Guy-Vincent
    Bochmann, Gregor
    Onut, Iosif-Viorel
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 407 - 416
  • [38] Sunspot forecasting by using chaotic timeseries analysis and NARX network
    Jiang C.
    Song F.
    Journal of Computers, 2011, 6 (07) : 1424 - 1429
  • [39] Detection of explosives and illicit drugs using neutrons
    Király, B
    Sanami, T
    Dóczi, R
    Csikai, J
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION B-BEAM INTERACTIONS WITH MATERIALS AND ATOMS, 2004, 213 : 452 - 456
  • [40] Detection of illicit traffic using neural networks
    Salvador, Paulo
    Nogueira, Antonio
    Franca, Ulisses
    Valadas, Rui
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 5 - 12