Inspection-L: Practical GNN-Based Money Laundering Detection System for
Bitcoin
- URL: http://arxiv.org/abs/2203.10465v1
- Date: Sun, 20 Mar 2022 06:19:18 GMT
- Title: Inspection-L: Practical GNN-Based Money Laundering Detection System for
Bitcoin
- Authors: Wai Weng Lo, Siamak Layeghy and Marius Portmann
- Abstract summary: This paper proposes Inspection-L, a graph neural network (GNN) framework based on self-supervised Deep Graph Infomax (DGI), with Random Forest (RF) to detect illicit transactions for Anti-Money laundering (AML)
To the best of our knowledge, our proposal is the first of applying self-supervised GNNs to the problem of AML in Bitcoin.
The proposed method has been evaluated on the Elliptic dataset and shows that our approach outperforms the state-of-the-art in terms of key classification metrics.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: Criminals have become increasingly experienced in using cryptocurrencies,
such as Bitcoin, for money laundering. The use of cryptocurrencies can hide
criminal identities and transfer hundreds of millions of dollars of dirty funds
through their criminal digital wallets. However, this is considered a paradox
because cryptocurrencies are gold mines for open-source intelligence, allowing
law enforcement agencies to have more power in conducting forensic analyses.
This paper proposed Inspection-L, a graph neural network (GNN) framework based
on self-supervised Deep Graph Infomax (DGI), with Random Forest (RF), to detect
illicit transactions for Anti-Money laundering (AML). To the best of our
knowledge, our proposal is the first of applying self-supervised GNNs to the
problem of AML in Bitcoin. The proposed method has been evaluated on the
Elliptic dataset and shows that our approach outperforms the state-of-the-art
in terms of key classification metrics, which demonstrates the potential of
self-supervised GNN in cryptocurrency illicit transaction detection.
Related papers
- ELEGANT: Certified Defense on the Fairness of Graph Neural Networks [94.10433608311604]
Graph Neural Networks (GNNs) have emerged as a prominent graph learning model in various graph-based tasks.
malicious attackers could easily corrupt the fairness level of their predictions by adding perturbations to the input graph data.
We propose a principled framework named ELEGANT to study a novel problem of certifiable defense on the fairness level of GNNs.
arXiv Detail & Related papers (2023-11-05T20:29:40Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Chainlet Orbits: Topological Address Embedding for the Bitcoin
Blockchain [15.099255988459602]
Rise of cryptocurrencies like Bitcoin, which enable transactions with a degree of pseudonymity, has led to a surge in various illicit activities.
We introduce an effective solution called Chainlet Orbits to embed Bitcoin addresses by leveraging their topological characteristics in transactions.
Our approach enables the use of interpretable and explainable machine learning models in as little as 15 minutes for most days on the Bitcoin transaction network.
arXiv Detail & Related papers (2023-05-18T21:16:59Z) - Motif-aware temporal GCN for fraud detection in signed cryptocurrency
trust networks [8.82136716762572]
Graph convolutional networks (GCNs) are used for processing data that can be represented as graphs.
In this study, we consider the evolving nature of cryptocurrency networks, and use local structural as well as the balance theory to guide the training process.
Experimental results on bitcoin-alpha and bitcoin-otc datasets show that the proposed model outperforms those in the literature.
arXiv Detail & Related papers (2022-11-22T02:03:27Z) - Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application
of Machine Learning-based Forensics [5.617291981476445]
The paper analyzes a real-world dataset of Bitcoin transactions represented as a directed graph network through various techniques.
It shows that the neural network types known as Graph Convolutional Networks (GCN) and Graph Attention Networks (GAT) are a promising AML/CFT solution.
arXiv Detail & Related papers (2022-06-07T16:22:55Z) - GuiltyWalker: Distance to illicit nodes in the Bitcoin network [1.7550798084784973]
We propose new features based on the structure of the graph and past labels to boost the performance of machine learning methods to detect money laundering.
Our method, GuiltyWalker, performs random walks on the bitcoin transaction graph and computes features based on the distance to illicit transactions.
arXiv Detail & Related papers (2021-02-10T10:29:13Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged
Fraudsters [78.53851936180348]
We introduce two types of camouflages based on recent empirical studies, i.e., the feature camouflage and the relation camouflage.
Existing GNNs have not addressed these two camouflages, which results in their poor performance in fraud detection problems.
We propose a new model named CAmouflage-REsistant GNN (CARE-GNN) to enhance the GNN aggregation process with three unique modules against camouflages.
arXiv Detail & Related papers (2020-08-19T22:33:12Z) - Machine learning methods to detect money laundering in the Bitcoin
blockchain in the presence of label scarcity [1.7499351967216341]
We show that existing state-of-the-art solutions using unsupervised anomaly detection methods are inadequate to detect the illicit patterns in a real Bitcoin transaction dataset.
Our proposed active learning solution is capable of matching the performance of a fully supervised baseline by using just 5% of the labels.
arXiv Detail & Related papers (2020-05-29T15:52:48Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [50.521292491613224]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z) - Defending against Backdoor Attack on Deep Neural Networks [98.45955746226106]
We study the so-called textitbackdoor attack, which injects a backdoor trigger to a small portion of training data.
Experiments show that our method could effectively decrease the attack success rate, and also hold a high classification accuracy for clean images.
arXiv Detail & Related papers (2020-02-26T02:03:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.