Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application
of Machine Learning-based Forensics
- URL: http://arxiv.org/abs/2206.04803v3
- Date: Sat, 18 Mar 2023 14:41:31 GMT
- Title: Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application
of Machine Learning-based Forensics
- Authors: Nadia Pocher, Mirko Zichichi, Fabio Merizzi, Muhammad Zohaib Shafiq
and Stefano Ferretti
- Abstract summary: The paper analyzes a real-world dataset of Bitcoin transactions represented as a directed graph network through various techniques.
It shows that the neural network types known as Graph Convolutional Networks (GCN) and Graph Attention Networks (GAT) are a promising AML/CFT solution.
- Score: 5.617291981476445
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In shaping the Internet of Money, the application of blockchain and
distributed ledger technologies (DLTs) to the financial sector triggered
regulatory concerns. Notably, while the user anonymity enabled in this field
may safeguard privacy and data protection, the lack of identifiability hinders
accountability and challenges the fight against money laundering and the
financing of terrorism and proliferation (AML/CFT). As law enforcement agencies
and the private sector apply forensics to track crypto transfers across
ecosystems that are socio-technical in nature, this paper focuses on the
growing relevance of these techniques in a domain where their deployment
impacts the traits and evolution of the sphere. In particular, this work offers
contextualized insights into the application of methods of machine learning and
transaction graph analysis. Namely, it analyzes a real-world dataset of Bitcoin
transactions represented as a directed graph network through various
techniques. The modeling of blockchain transactions as a complex network
suggests that the use of graph-based data analysis methods can help classify
transactions and identify illicit ones. Indeed, this work shows that the neural
network types known as Graph Convolutional Networks (GCN) and Graph Attention
Networks (GAT) are a promising AML/CFT solution. Notably, in this scenario GCN
outperform other classic approaches and GAT are applied for the first time to
detect anomalies in Bitcoin. Ultimately, the paper upholds the value of
public-private synergies to devise forensic strategies conscious of the spirit
of explainability and data openness.
Related papers
- Review of blockchain application with Graph Neural Networks, Graph Convolutional Networks and Convolutional Neural Networks [0.0]
This paper reviews the applications of Graph Neural Networks (GNNs), Graph Convolutional Networks (GCNs), and Convolutional Neural Networks (CNNs) in blockchain technology.
arXiv Detail & Related papers (2024-10-01T17:11:22Z) - Graph Network Models To Detect Illicit Transactions In Block Chain [0.0]
cryptocurrencies have led to an increase in illicit activities such as money laundering.
We propose a novel approach to tackling this problem by applying graph attention networks with residual network-like architecture (GAT-ResNet)
Our results demonstrate that the GAT-ResNet model has a potential to outperform the existing graph network models in terms of accuracy, reliability and scalability.
arXiv Detail & Related papers (2024-09-23T04:38:44Z) - Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks [50.87615167799367]
We certify Graph Neural Networks (GNNs) against poisoning attacks, including backdoors, targeting the node features of a given graph.
Our framework provides fundamental insights into the role of graph structure and its connectivity on the worst-case behavior of convolution-based and PageRank-based GNNs.
arXiv Detail & Related papers (2024-07-15T16:12:51Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Motif-aware temporal GCN for fraud detection in signed cryptocurrency
trust networks [8.82136716762572]
Graph convolutional networks (GCNs) are used for processing data that can be represented as graphs.
In this study, we consider the evolving nature of cryptocurrency networks, and use local structural as well as the balance theory to guide the training process.
Experimental results on bitcoin-alpha and bitcoin-otc datasets show that the proposed model outperforms those in the literature.
arXiv Detail & Related papers (2022-11-22T02:03:27Z) - Blockchain Phishing Scam Detection via Multi-channel Graph
Classification [1.6980621769406918]
Phishing scam detection methods will protect possible victims and build a healthier blockchain ecosystem.
We defined the transaction pattern graphs for users and transformed the phishing scam detection into a graph classification task.
The proposed multi-channel graph classification model (MCGC) is more able to detect potential phishing by extracting the transaction pattern features of the target users.
arXiv Detail & Related papers (2021-08-19T02:59:55Z) - Relational Graph Neural Networks for Fraud Detection in a Super-App
environment [53.561797148529664]
We propose a framework of relational graph convolutional networks methods for fraudulent behaviour prevention in the financial services of a Super-App.
We use an interpretability algorithm for graph neural networks to determine the most important relations to the classification task of the users.
Our results show that there is an added value when considering models that take advantage of the alternative data of the Super-App and the interactions found in their high connectivity.
arXiv Detail & Related papers (2021-07-29T00:02:06Z) - Identity Inference on Blockchain using Graph Neural Network [5.5927440285709835]
Identity inference, which aims to make a preliminary inference about account identity, plays a significant role in blockchain security.
We present a novel approach to analyze user's behavior from the perspective of the transaction subgraph, which naturally transforms the identity inference task into a graph classification pattern.
We also propose a generic end-to-end graph neural network model, named $textI2 textBGNN$, which can accept subgraph as input and learn a function mapping the transaction subgraph pattern to account identity.
arXiv Detail & Related papers (2021-04-14T00:15:38Z) - Graph Backdoor [53.70971502299977]
We present GTA, the first backdoor attack on graph neural networks (GNNs)
GTA departs in significant ways: it defines triggers as specific subgraphs, including both topological structures and descriptive features.
It can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks.
arXiv Detail & Related papers (2020-06-21T19:45:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.