Clustering and analysis of user behaviour in blockchain: A case study of Planet IX
- URL: http://arxiv.org/abs/2504.11702v1
- Date: Wed, 16 Apr 2025 01:57:33 GMT
- Title: Clustering and analysis of user behaviour in blockchain: A case study of Planet IX
- Authors: Dorottya Zelenyanszki, Zhe Hou, Kamanashis Biswas, Vallipuram Muthukkumarasamy,
- Abstract summary: A user behaviour analysis pipeline was proposed to present how this type of information can be extracted and analysed.<n>The pipeline starts with the collection of transaction data, involving smart contracts, that is collected from a blockchain-based game called Planet IX.<n>From this data, separate game actions can be formed and those are leveraged to present how and when the users conducted their in-game activities.<n>It was found that behavioural information can be extracted regarding the users that belong to these clusters.
- Score: 0.14999444543328289
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Decentralised applications (dApps) that run on public blockchains have the benefit of trustworthiness and transparency as every activity that happens on the blockchain can be publicly traced through the transaction data. However, this introduces a potential privacy problem as this data can be tracked and analysed, which can reveal user-behaviour information. A user behaviour analysis pipeline was proposed to present how this type of information can be extracted and analysed to identify separate behavioural clusters that can describe how users behave in the game. The pipeline starts with the collection of transaction data, involving smart contracts, that is collected from a blockchain-based game called Planet IX. Both the raw transaction information and the transaction events are considered in the data collection. From this data, separate game actions can be formed and those are leveraged to present how and when the users conducted their in-game activities in the form of user flows. An extended version of these user flows also presents how the Non-Fungible Tokens (NFTs) are being leveraged in the user actions. The latter is given as input for a Graph Neural Network (GNN) model to provide graph embeddings for these flows which then can be leveraged by clustering algorithms to cluster user behaviours into separate behavioural clusters. We benchmark and compare well-known clustering algorithms as a part of the proposed method. The user behaviour clusters were analysed and visualised in a graph format. It was found that behavioural information can be extracted regarding the users that belong to these clusters. Such information can be exploited by malicious users to their advantage. To demonstrate this, a privacy threat model was also presented based on the results that correspond to multiple potentially affected areas.
Related papers
- Cluster-based Graph Collaborative Filtering [55.929052969825825]
Graph Convolution Networks (GCNs) have succeeded in learning user and item representations for recommendation systems.
Most existing GCN-based methods overlook the multiple interests of users while performing high-order graph convolution.
We propose a novel GCN-based recommendation model, termed Cluster-based Graph Collaborative Filtering (ClusterGCF)
arXiv Detail & Related papers (2024-04-16T07:05:16Z) - Reinforcement Graph Clustering with Unknown Cluster Number [91.4861135742095]
We propose a new deep graph clustering method termed Reinforcement Graph Clustering.
In our proposed method, cluster number determination and unsupervised representation learning are unified into a uniform framework.
In order to conduct feedback actions, the clustering-oriented reward function is proposed to enhance the cohesion of the same clusters and separate the different clusters.
arXiv Detail & Related papers (2023-08-13T18:12:28Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Behavioral graph fraud detection in E-commerce [10.621640214806794]
We present a novel behavioral biometric based method to establish transaction linkings based on user behavioral similarities.
To our knowledge, this is the first time similarity based soft link has been used in graph embedding applications.
Our experiments show that embedding features learned from similarity based behavioral graph have achieved significant performance increase to the baseline fraud detection model.
arXiv Detail & Related papers (2022-10-13T12:47:09Z) - Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using
Graph Propagation [52.9168275057997]
This paper presents Enel, a novel dynamic scaling approach that uses message propagation on an attributed graph to model dataflow jobs.
We show that Enel is able to identify effective rescaling actions, reacting for instance to node failures, and can be reused across different execution contexts.
arXiv Detail & Related papers (2021-08-27T10:21:08Z) - Blockchain Phishing Scam Detection via Multi-channel Graph
Classification [1.6980621769406918]
Phishing scam detection methods will protect possible victims and build a healthier blockchain ecosystem.
We defined the transaction pattern graphs for users and transformed the phishing scam detection into a graph classification task.
The proposed multi-channel graph classification model (MCGC) is more able to detect potential phishing by extracting the transaction pattern features of the target users.
arXiv Detail & Related papers (2021-08-19T02:59:55Z) - Community Detection for Access-Control Decisions: Analysing the Role of
Homophily and Information Diffusion in Online Social Networks [0.0]
Access-Control Lists (ACLs) are one of the most important privacy features of Online Social Networks (OSNs)
This work investigates the use of community-detection algorithms for the automatic generation of ACLs in OSNs.
arXiv Detail & Related papers (2021-04-19T08:49:59Z) - Identity Inference on Blockchain using Graph Neural Network [5.5927440285709835]
Identity inference, which aims to make a preliminary inference about account identity, plays a significant role in blockchain security.
We present a novel approach to analyze user's behavior from the perspective of the transaction subgraph, which naturally transforms the identity inference task into a graph classification pattern.
We also propose a generic end-to-end graph neural network model, named $textI2 textBGNN$, which can accept subgraph as input and learn a function mapping the transaction subgraph pattern to account identity.
arXiv Detail & Related papers (2021-04-14T00:15:38Z) - Detecting Malicious Accounts in Permissionless Blockchains using
Temporal Graph Properties [4.506782035297339]
temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain.
Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties.
We train various Machine Learning (ML) algorithms to identify the algorithm that performs the best in detecting which accounts are malicious.
arXiv Detail & Related papers (2020-07-10T05:15:26Z) - LSD-C: Linearly Separable Deep Clusters [145.89790963544314]
We present LSD-C, a novel method to identify clusters in an unlabeled dataset.
Our method draws inspiration from recent semi-supervised learning practice and proposes to combine our clustering algorithm with self-supervised pretraining and strong data augmentation.
We show that our approach significantly outperforms competitors on popular public image benchmarks including CIFAR 10/100, STL 10 and MNIST, as well as the document classification dataset Reuters 10K.
arXiv Detail & Related papers (2020-06-17T17:58:10Z) - Mining Implicit Entity Preference from User-Item Interaction Data for
Knowledge Graph Completion via Adversarial Learning [82.46332224556257]
We propose a novel adversarial learning approach by leveraging user interaction data for the Knowledge Graph Completion task.
Our generator is isolated from user interaction data, and serves to improve the performance of the discriminator.
To discover implicit entity preference of users, we design an elaborate collaborative learning algorithms based on graph neural networks.
arXiv Detail & Related papers (2020-03-28T05:47:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.