GuiltyWalker: Distance to illicit nodes in the Bitcoin network
- URL: http://arxiv.org/abs/2102.05373v1
- Date: Wed, 10 Feb 2021 10:29:13 GMT
- Title: GuiltyWalker: Distance to illicit nodes in the Bitcoin network
- Authors: Catarina Oliveira, Jo\~ao Torres, Maria In\^es Silva, David
Apar\'icio, Jo\~ao Tiago Ascens\~ao, Pedro Bizarro
- Abstract summary: We propose new features based on the structure of the graph and past labels to boost the performance of machine learning methods to detect money laundering.
Our method, GuiltyWalker, performs random walks on the bitcoin transaction graph and computes features based on the distance to illicit transactions.
- Score: 1.7550798084784973
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Money laundering is a global phenomenon with wide-reaching social and
economic consequences. Cryptocurrencies are particularly susceptible due to the
lack of control by authorities and their anonymity. Thus, it is important to
develop new techniques to detect and prevent illicit cryptocurrency
transactions. In our work, we propose new features based on the structure of
the graph and past labels to boost the performance of machine learning methods
to detect money laundering. Our method, GuiltyWalker, performs random walks on
the bitcoin transaction graph and computes features based on the distance to
illicit transactions. We combine these new features with features proposed by
Weber et al. and observe an improvement of about 5pp regarding illicit
classification. Namely, we observe that our proposed features are particularly
helpful during a black market shutdown, where the algorithm by Weber et al. was
low performing.
Related papers
- Cryptocurrency Portfolio Optimization by Neural Networks [81.20955733184398]
This paper proposes an effective algorithm based on neural networks to take advantage of these investment products.
A deep neural network, which outputs the allocation weight of each asset at a time interval, is trained to maximize the Sharpe ratio.
A novel loss term is proposed to regulate the network's bias towards a specific asset, thus enforcing the network to learn an allocation strategy that is close to a minimum variance strategy.
arXiv Detail & Related papers (2023-10-02T12:33:28Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Chainlet Orbits: Topological Address Embedding for the Bitcoin
Blockchain [15.099255988459602]
Rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities.
We introduce an effective solution called Chainlet Orbits to embed Bitcoin addresses by leveraging their topological characteristics in transactions.
Our approach enables the use of interpretable and explainable machine learning models in as little as 15 minutes for most days on the Bitcoin transaction network.
arXiv Detail & Related papers (2023-05-18T21:16:59Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application
of Machine Learning-based Forensics [5.617291981476445]
The paper analyzes a real-world dataset of Bitcoin transactions represented as a directed graph network through various techniques.
It shows that the neural network types known as Graph Convolutional Networks (GCN) and Graph Attention Networks (GAT) are a promising AML/CFT solution.
arXiv Detail & Related papers (2022-06-07T16:22:55Z) - Inspection-L: Practical GNN-Based Money Laundering Detection System for
Bitcoin [0.0]
This paper proposes Inspection-L, a graph neural network (GNN) framework based on self-supervised Deep Graph Infomax (DGI), with Random Forest (RF) to detect illicit transactions for Anti-Money laundering (AML)
To the best of our knowledge, our proposal is the first of applying self-supervised GNNs to the problem of AML in Bitcoin.
The proposed method has been evaluated on the Elliptic dataset and shows that our approach outperforms the state-of-the-art in terms of key classification metrics.
arXiv Detail & Related papers (2022-03-20T06:19:18Z) - Deep Fraud Detection on Non-attributed Graph [61.636677596161235]
Graph Neural Networks (GNNs) have shown solid performance on fraud detection.
labeled data is scarce in large-scale industrial problems, especially for fraud detection.
We propose a novel graph pre-training strategy to leverage more unlabeled data.
arXiv Detail & Related papers (2021-10-04T03:42:09Z) - Relational Graph Neural Networks for Fraud Detection in a Super-App
environment [53.561797148529664]
We propose a framework of relational graph convolutional networks methods for fraudulent behaviour prevention in the financial services of a Super-App.
We use an interpretability algorithm for graph neural networks to determine the most important relations to the classification task of the users.
Our results show that there is an added value when considering models that take advantage of the alternative data of the Super-App and the interactions found in their high connectivity.
arXiv Detail & Related papers (2021-07-29T00:02:06Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Machine learning methods to detect money laundering in the Bitcoin
blockchain in the presence of label scarcity [1.7499351967216341]
We show that existing state-of-the-art solutions using unsupervised anomaly detection methods are inadequate to detect the illicit patterns in a real Bitcoin transaction dataset.
Our proposed active learning solution is capable of matching the performance of a fully supervised baseline by using just 5% of the labels.
arXiv Detail & Related papers (2020-05-29T15:52:48Z) - Characterizing and Detecting Money Laundering Activities on the Bitcoin
Network [8.212945859699406]
We explore the landscape of potential money laundering activities occurring across the Bitcoin network.
Using data collected over three years, we create transaction graphs and provide an analysis on various graph characteristics to differentiate money laundering transactions from regular transactions.
We propose and evaluate a set of classifiers based on four types of graph features to classify money laundering and regular transactions.
arXiv Detail & Related papers (2019-12-27T11:34:41Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.