Characterizing and Detecting Money Laundering Activities on the Bitcoin
Network
- URL: http://arxiv.org/abs/1912.12060v1
- Date: Fri, 27 Dec 2019 11:34:41 GMT
- Title: Characterizing and Detecting Money Laundering Activities on the Bitcoin
Network
- Authors: Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke
Fukuda, Aruna Seneviratne
- Abstract summary: We explore the landscape of potential money laundering activities occurring across the Bitcoin network.
Using data collected over three years, we create transaction graphs and provide an analysis on various graph characteristics to differentiate money laundering transactions from regular transactions.
We propose and evaluate a set of classifiers based on four types of graph features to classify money laundering and regular transactions.
- Score: 8.212945859699406
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Bitcoin is by far the most popular crypto-currency solution enabling
peer-to-peer payments. Despite some studies highlighting the network does not
provide full anonymity, it is still being heavily used for a wide variety of
dubious financial activities such as money laundering, ponzi schemes, and
ransom-ware payments. In this paper, we explore the landscape of potential
money laundering activities occurring across the Bitcoin network. Using data
collected over three years, we create transaction graphs and provide an
in-depth analysis on various graph characteristics to differentiate money
laundering transactions from regular transactions. We found that the main
difference between laundering and regular transactions lies in their output
values and neighbourhood information. Then, we propose and evaluate a set of
classifiers based on four types of graph features: immediate neighbours,
curated features, deepwalk embeddings, and node2vec embeddings to classify
money laundering and regular transactions. Results show that the node2vec-based
classifier outperforms other classifiers in binary classification reaching an
average accuracy of 92.29% and an F1-measure of 0.93 and high robustness over a
2.5-year time span. Finally, we demonstrate how effective our classifiers are
in discovering unknown laundering services. The classifier performance dropped
compared to binary classification, however, the prediction can be improved with
simple ensemble techniques for some services.
Related papers
- Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning [19.2372535101502]
Existing malicious transaction detection methods rely on large amounts of labeled data.
We propose ShadowEyes, a novel malicious transaction detection method.
We conduct extensive experiments using public datasets to evaluate the performance of ShadowEyes.
arXiv Detail & Related papers (2024-10-31T02:01:42Z) - Cryptocurrency Portfolio Optimization by Neural Networks [81.20955733184398]
This paper proposes an effective algorithm based on neural networks to take advantage of these investment products.
A deep neural network, which outputs the allocation weight of each asset at a time interval, is trained to maximize the Sharpe ratio.
A novel loss term is proposed to regulate the network's bias towards a specific asset, thus enforcing the network to learn an allocation strategy that is close to a minimum variance strategy.
arXiv Detail & Related papers (2023-10-02T12:33:28Z) - Topology-Agnostic Detection of Temporal Money Laundering Flows in
Billion-Scale Transactions [0.03626013617212666]
We propose a framework to efficiently construct a temporal graph of sequential transactions.
We evaluate the scalability and the effectiveness of our framework against two state-of-the-art solutions for detecting suspicious flows of transactions.
arXiv Detail & Related papers (2023-09-24T15:11:58Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Chainlet Orbits: Topological Address Embedding for the Bitcoin
Blockchain [15.099255988459602]
Rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities.
We introduce an effective solution called Chainlet Orbits to embed Bitcoin addresses by leveraging their topological characteristics in transactions.
Our approach enables the use of interpretable and explainable machine learning models in as little as 15 minutes for most days on the Bitcoin transaction network.
arXiv Detail & Related papers (2023-05-18T21:16:59Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Fighting Money Laundering with Statistics and Machine Learning [95.42181254494287]
There is little scientific literature on statistical and machine learning methods for anti-money laundering.
We propose a unifying terminology with two central elements: (i) client risk profiling and (ii) suspicious behavior flagging.
arXiv Detail & Related papers (2022-01-11T21:31:18Z) - Supporting Financial Inclusion with Graph Machine Learning and Super-App
Alternative Data [63.942632088208505]
Super-Apps have changed the way we think about the interactions between users and commerce.
This paper investigates how different interactions between users within a Super-App provide a new source of information to predict borrower behavior.
arXiv Detail & Related papers (2021-02-19T15:13:06Z) - GuiltyWalker: Distance to illicit nodes in the Bitcoin network [1.7550798084784973]
We propose new features based on the structure of the graph and past labels to boost the performance of machine learning methods to detect money laundering.
Our method, GuiltyWalker, performs random walks on the bitcoin transaction graph and computes features based on the distance to illicit transactions.
arXiv Detail & Related papers (2021-02-10T10:29:13Z) - Machine learning methods to detect money laundering in the Bitcoin
blockchain in the presence of label scarcity [1.7499351967216341]
We show that existing state-of-the-art solutions using unsupervised anomaly detection methods are inadequate to detect the illicit patterns in a real Bitcoin transaction dataset.
Our proposed active learning solution is capable of matching the performance of a fully supervised baseline by using just 5% of the labels.
arXiv Detail & Related papers (2020-05-29T15:52:48Z) - Heterogeneous Graph Neural Networks for Malicious Account Detection [64.0046412312209]
We present GEM, the first heterogeneous graph neural network approach for detecting malicious accounts.
We learn discriminative embeddings from heterogeneous account-device graphs based on two fundamental weaknesses of attackers, i.e. device aggregation and activity aggregation.
Experiments show that our approaches consistently perform promising results compared with competitive methods over time.
arXiv Detail & Related papers (2020-02-27T18:26:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.