Towards Malicious address identification in Bitcoin
- URL: http://arxiv.org/abs/2112.11721v1
- Date: Wed, 22 Dec 2021 08:11:58 GMT
- Title: Towards Malicious address identification in Bitcoin
- Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla
- Abstract summary: We generate the temporal and non-temporal feature set and train the Machine Learning (ML) algorithm over different temporal granularities to validate methods.
A comparative analysis of results show that the behavior of addresses in and Bitcoin is similar with respect to in-degree, out-degree and inter-event time.
We identify 3 suspects that showed malicious behavior across different temporal granularities.
- Score: 3.646526715728388
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The temporal aspect of blockchain transactions enables us to study the
address's behavior and detect if it is involved in any illicit activity.
However, due to the concept of change addresses (used to thwart replay
attacks), temporal aspects are not directly applicable in the Bitcoin
blockchain. Several pre-processing steps should be performed before such
temporal aspects are utilized. We are motivated to study the Bitcoin
transaction network and use the temporal features such as burst,
attractiveness, and inter-event time along with several graph-based properties
such as the degree of node and clustering coefficient to validate the
applicability of already existing approaches known for other cryptocurrency
blockchains on the Bitcoin blockchain. We generate the temporal and
non-temporal feature set and train the Machine Learning (ML) algorithm over
different temporal granularities to validate the state-of-the-art methods. We
study the behavior of the addresses over different time granularities of the
dataset. We identify that after applying change-address clustering, in Bitcoin,
existing temporal features can be extracted and ML approaches can be applied. A
comparative analysis of results show that the behavior of addresses in Ethereum
and Bitcoin is similar with respect to in-degree, out-degree and inter-event
time. Further, we identify 3 suspects that showed malicious behavior across
different temporal granularities. These suspects are not marked as malicious in
Bitcoin.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - Bidirectional Decoding: Improving Action Chunking via Closed-Loop Resampling [51.38330727868982]
Bidirectional Decoding (BID) is a test-time inference algorithm that bridges action chunking with closed-loop operations.
We show that BID boosts the performance of two state-of-the-art generative policies across seven simulation benchmarks and two real-world tasks.
arXiv Detail & Related papers (2024-08-30T15:39:34Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - The Spatiotemporal Scaling Laws of Bitcoin Transactions [0.4779196219827508]
We study the unique patterns unique to Bitcoin.
We empirically characterize Bitcoin transactions'temporal scaling laws.
We introduce a Markovian model that effectively approximates Bitcoins' observedtemporal patterns.
arXiv Detail & Related papers (2023-09-21T08:34:47Z) - Demystifying Fraudulent Transactions and Illicit Nodes in the Bitcoin
Network for Financial Forensics [8.97719386315469]
This paper presents a holistic applied data science approach to fraud detection in the Bitcoin network.
First, we contribute the Elliptic++ dataset, which extends the Elliptic transaction dataset to include over 822k Bitcoin wallet addresses (nodes)
Second, we perform fraud detection tasks on all four graphs by using diverse machine learning algorithms.
arXiv Detail & Related papers (2023-05-25T18:36:54Z) - Chainlet Orbits: Topological Address Embedding for the Bitcoin
Blockchain [15.099255988459602]
Rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities.
We introduce an effective solution called Chainlet Orbits to embed Bitcoin addresses by leveraging their topological characteristics in transactions.
Our approach enables the use of interpretable and explainable machine learning models in as little as 15 minutes for most days on the Bitcoin transaction network.
arXiv Detail & Related papers (2023-05-18T21:16:59Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Demystifying Bitcoin Address Behavior via Graph Neural Networks [20.002509270755443]
BAClassifier is a tool that can automatically classify bitcoin addresses based on their behaviors.
We construct and release a large-scale annotated dataset that consists of over 2 million real-world bitcoin addresses.
arXiv Detail & Related papers (2022-11-26T14:55:50Z) - Pattern Analysis of Money Flow in the Bitcoin Blockchain [1.14219428942199]
We propose a method based on taint analysis to extract taint flows.
We apply graph embedding methods to characterize taint flows.
Our work proves that tracing the money flows can be a promising approach to classifying source actors.
arXiv Detail & Related papers (2022-07-15T07:15:16Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.