Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3485832.3485913acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback

Published: 06 December 2021 Publication History

Abstract

We show that knowledge of wallet addresses from the current time state of a blockchain network, such as Bitcoin, increases the performance of illicit activity detection. Based on this finding we introduce two new methods for the sampling of classifier training data so that precedence is given to transaction information from the recent past and the current time state. This sampling enables streaming classification in which a decision on the class of a transaction needs to be made based on data seen to date. Our new approach provides insight into how the dynamics of the blockchain network plays a central role in the detection of illicit transactions, and is independent of the classifier choice. Our proposed sampling methods enable graph convolution network (GCN) and random forest (RF) classifiers to better adapt to changes in the network due to significant events, such as the closure of a large ‘Darknet’ marketplace. We introduce Graphlet spectral correlation analysis for exposing the effect of such network re-organisation due to major events. Finally, based on our analysis, we propose a new two-stage random forest classifier that feeds back intermediate predictions of neighbours to improve the classification decision. Our methodology enables practical streaming classification, even in the scenario of very limited information on the feature space of each transaction.

References

[1]
2019. The Elliptic Data-set. https://www.kaggle.com/ellipticco/elliptic-data-set
[2]
2019. Financial Conduct Authority, Joint Money Laundering Steering Group (JMLSG) PART II, Chapter 22. https://www.fca.org.uk/firms/financial-crime/cryptoassets-aml-ctf-regime
[3]
2020. European Commission, Directorate-General for Financial Stability, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on Markets in Crypto-assets, and amending Directive (EU). https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:52020PC0593
[4]
Nesreen K Ahmed, Jennifer Neville, Ryan A Rossi, and Nick Duffield. 2015. Efficient graphlet counting for large networks. In 2015 IEEE International Conference on Data Mining. IEEE, 1–10.
[5]
Ismail Alarab, Simant Prakoonwit, and Mohamed Ikbal Nacer. 2020. Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain. In Proceedings of the 2020 5th International Conference on Machine Learning Technologies. 23–27.
[6]
Massimo Bartoletti, Barbara Pes, and Sergio Serusi. 2018. Data Mining for Detecting Bitcoin Ponzi Schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 75–84. https://doi.org/10.1109/CVCBT.2018.00014
[7]
Ramiro Daniel Camino, Radu State, Leandro Montero, and Petko Valtchev. 2017. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 787–796. https://doi.org/10.1109/ICDMW.2017.109
[8]
Weili Chen, Zibin Zheng, Edith C.-H. Ngai, Peilin Zheng, and Yuren Zhou. 2019. Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum. IEEE Access 7(2019), 37575–37586. https://doi.org/10.1109/ACCESS.2019.2905769
[9]
Steven Farrugia, Joshua Ellul, and George Azzopardi. 2020. Detection of illicit accounts over the Ethereum blockchain. Expert Systems with Applications 150 (2020), 113318. https://doi.org/10.1016/j.eswa.2020.113318
[10]
Everette S. Gardner Jr.1985. Exponential smoothing: The state of the art. Journal of Forecasting 4, 1 (1985), 1–28. https://doi.org/10.1002/for.3980040103 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/for.3980040103
[11]
Johannes Heinrich and David Silver. 2016. Deep Reinforcement Learning from Self-Play in Imperfect-Information Games. arxiv:1603.01121 [cs.LG]
[12]
Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, and Aruna Seneviratne. 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arxiv:1912.12060 [cs.SI]
[13]
Yuriy Hulovatyy, Huili Chen, and Tijana Milenković. 2015. Exploring the structure and function of temporal networks with dynamic graphlets. Bioinformatics 31, 12 (2015), i171–i180.
[14]
Marc Jourdan, Sebastien Blandin, Laura Wynter, and Pralhad Deshpande. 2018. Characterizing Entities in the Bitcoin Blockchain. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 55–62. https://doi.org/10.1109/ICDMW.2018.00016
[15]
Eunjin Jung, Marion Le Tilly, Ashish Gehani, and Yunjie Ge. 2019. Data Mining-Based Ethereum Fraud Detection. In 2019 IEEE International Conference on Blockchain (Blockchain). 266–273. https://doi.org/10.1109/Blockchain.2019.00042
[16]
Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016).
[17]
Stephen G. Kobourov. 2012. Spring Embedders and Force Directed Graph Drawing Algorithms. arXiv e-prints (2012). arxiv:1201.3011
[18]
Dániel Kondor, István Csabai, János Szüle, Márton Pósfai, and Gábor Vattay. 2014. Inferring the interplay between network structure and market effects in Bitcoin. New Journal of Physics 16, 12 (dec 2014), 125003. https://doi.org/10.1088/1367-2630/16/12/125003
[19]
Jiaqi Liang, Linjing Li, Weiyun Chen, and Daniel Zeng. 2019. Targeted Addresses Identification for Bitcoin with Network Representation Learning. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). 158–160. https://doi.org/10.1109/ISI.2019.8823249
[20]
Xiao Fan Liu, Xin-Jian Jiang, Si-Hao Liu, and Chi Kong Tse. 2021. Knowledge Discovery in Cryptocurrency Transactions: A Survey. IEEE Access 9(2021), 37229–37254. https://doi.org/10.1109/ACCESS.2021.3062652
[21]
Joana Lorenz, Maria Inês Silva, David Aparício, João Tiago Ascensão, and Pedro Bizarro. 2020. Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity. arXiv preprint arXiv:2005.14635(2020).
[22]
Noël Malod-Dognin and Nataša Pržulj. 2014. GR-Align: fast and flexible alignment of protein 3D structures using graphlet degree similarity. Bioinformatics 30, 9 (2014), 1259–1265.
[23]
Patrick Monamo, Vukosi Marivate, and Bheki Twala. 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA). IEEE, 129–134.
[24]
Patrick M. Monamo, Vukosi Marivate, and Bhesipho Twala. 2016. A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers. In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). 188–194. https://doi.org/10.1109/ICMLA.2016.0039
[25]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.
[26]
Miles Osborne, Ashwin Lall, and Benjamin Van Durme. 2014. Exponential reservoir sampling for streaming language models. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). 687–692.
[27]
Michał Ostapowicz and Kamil Żbikowski. 2019. Detecting Fraudulent Accounts on Blockchain: A Supervised Approach. In Web Information Systems Engineering – WISE 2019, Reynold Cheng, Nikos Mamoulis, Yizhou Sun, and Xin Huang (Eds.). Springer International Publishing, Cham, 18–31.
[28]
Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao B. Schardl, and Charles E. Leiserson. 2019. EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs. arxiv:1902.10191 [cs.LG]
[29]
Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941(2016).
[30]
Thai Pham and Steven Lee. 2017. Anomaly Detection in the Bitcoin System - A Network Perspective. arxiv:1611.03942 [cs.SI]
[31]
Natasa Pržulj, Derek G Corneil, and Igor Jurisica. 2004. Modeling interactome: scale-free or geometric?Bioinformatics 20, 18 (2004), 3508–3515.
[32]
Stephen Ranshous, Cliff A. Joslyn, Sean Kreyling, Kathleen Nowak, Nagiza F. Samatova, Curtis L. West, and Samuel Winters. 2017. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph. In Financial Cryptography and Data Security. Springer International Publishing, Cham, 248–263.
[33]
Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security. Springer, 6–24.
[34]
Muhammad Saad and Aziz Mohaisen. 2018. Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 704–709. https://doi.org/10.1109/INFCOMW.2018.8406859
[35]
Anida Sarajlić, Noël Malod-Dognin, Ömer Nebil Yaveroğlu, and Nataša Pržulj. 2016. Graphlet-based characterization of directed networks. Scientific reports 6, 1 (2016), 1–14.
[36]
Kentaroh Toyoda, Tomoaki Ohtsuki, and P. Takis Mathiopoulos. 2018. Time Series Analysis for Bitcoin Transactions: The Case of Pirate@40’s HYIP Scheme. In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). 151–155. https://doi.org/10.1109/ICDMW.2018.00028
[37]
Kentaroh Toyoda, P. Takis Mathiopoulos, and Tomoaki Ohtsuki. 2019. A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification. IEEE Access 7(2019), 74835–74848. https://doi.org/10.1109/ACCESS.2019.2921087 Funding Information: This work was supported by JSPS (Japan Society for the Promotion of Science) KAKENHI Grant Number JP18K18162. Publisher Copyright: © 2013 IEEE.
[38]
Dylan Vassallo, Vincent Vella, and Joshua Ellul. 2021. Application of Gradient Boosting Algorithms for Anti-money Laundering in Cryptocurrencies. SN Computer Science 2, 3 (2021), 1–15.
[39]
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I Weidele, Claudio Bellei, Tom Robinson, and Charles E Leiserson. 2019. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591(2019).
[40]
Jiajing Wu, Jieli Liu, Weili Chen, Huawei Huang, Zibin Zheng, and Yan Zhang. 2021. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2021).
[41]
Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2020. Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2020), 1–11. https://doi.org/10.1109/TSMC.2020.3016821
[42]
Ömer Nebil Yaveroğlu, Noël Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk Janjic, Rasa Karapandza, Aleksandar Stojmirovic, and Nataša Pržulj. 2014. Revealing the hidden language of complex networks. Scientific reports 4, 1 (2014), 1–9.
[43]
Haohua Sun Yin and Ravi Vatrapu. 2017. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 3690–3699.
[44]
Guy Zyskind, Oz Nathan, 2015. Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops. IEEE, 180–184.

Cited By

View all
  • (2023)Robust recurrent graph convolutional network approach based sequential prediction of illicit transactions in cryptocurrenciesMultimedia Tools and Applications10.1007/s11042-023-17323-483:20(58449-58464)Online publication date: 22-Dec-2023
  • (2022)Ledgit: A Service to Diagnose Illicit Addresses on Blockchain using Multi-modal Unsupervised LearningProceedings of the 31st ACM International Conference on Information & Knowledge Management10.1145/3511808.3557212(5069-5073)Online publication date: 17-Oct-2022

Index Terms

  1. Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACSAC '21: Proceedings of the 37th Annual Computer Security Applications Conference
        December 2021
        1077 pages
        ISBN:9781450385794
        DOI:10.1145/3485832
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 06 December 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Bitcoin
        2. Blockchain
        3. Fraud
        4. Graph classification
        5. Network Dynamics

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ACSAC '21

        Acceptance Rates

        Overall Acceptance Rate 104 of 497 submissions, 21%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)27
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 24 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Robust recurrent graph convolutional network approach based sequential prediction of illicit transactions in cryptocurrenciesMultimedia Tools and Applications10.1007/s11042-023-17323-483:20(58449-58464)Online publication date: 22-Dec-2023
        • (2022)Ledgit: A Service to Diagnose Illicit Addresses on Blockchain using Multi-modal Unsupervised LearningProceedings of the 31st ACM International Conference on Information & Knowledge Management10.1145/3511808.3557212(5069-5073)Online publication date: 17-Oct-2022

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media