Skip to main content

Could Network Information Facilitate Address Clustering in Bitcoin?

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10323))

Included in the following conference series:

Abstract

Address clustering tries to break the privacy of bitcoin users by linking all addresses created by an individual user, based on information available from the blockchain. As an alternative information source, observations of the underlying peer-to-peer network have also been used to attack the privacy of users. In this paper, we assess whether combining blockchain and network information may facilitate the clustering process. For this purpose, we apply all applicable clustering heuristics that are known to us to current blockchain information and associate the resulting clusters with IP address information extracted from observing the message flooding process of the bitcoin network. The results indicate that only a small share of clusters (less than 8%) were conspicuously associated with a single IP address. Also, only a small number of IP addresses showed a conspicuous association with a single cluster.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to our measurements (http://dsn.tm.kit.edu/bitcoin), there are \(\approx \)4,200 peers reachable via IPv4 and an additional \(\approx \)1,500 peers reachable via IPv6. As we do not know how many peers are dual-stacked (reachable via IPv4 and IPv6), we cannot directly determine the exact number of reachable peers.

  2. 2.

    https://github.com/tillneu/bitcoin-clusterer.

  3. 3.

    http://dev.maxmind.com/geoip/.

References

  1. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_4

    Chapter  Google Scholar 

  2. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM (2014)

    Google Scholar 

  3. Biryukov, A., Pustogarov, I.: Bitcoin over tor isn’t a good idea. arXiv preprint arXiv:1410.6079 (2014)

  4. DuPont, J., Squicciarini, A.C.: Toward de-anonymizing bitcoin by mapping users location. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 139–141. ACM (2015)

    Google Scholar 

  5. Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. arXiv preprint arXiv:1605.06369 (2016)

  6. Kaminsky, D.: Black ops of TCP/IP. Black Hat USA (2011)

    Google Scholar 

  7. Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469–485. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_30

    Google Scholar 

  8. Lin, M., Lucas Jr., H.C., Shmueli, G.: Research commentary-too big to fail: large samples and the p-value problem. Inf. Syst. Res. 24(4), 906–917 (2013)

    Article  Google Scholar 

  9. Maxwell, G.: Coinjoin: Bitcoin privacy for the real world (2013). https://bitcointalk.org/index.php?topic=279249. Accessed 27 Sep 2016

  10. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013)

    Google Scholar 

  11. Mendenhall, W., Beaver, R.J., Beaver, B.M.: Introduction to Probability and Statistics. Cengage Learning (2012)

    Google Scholar 

  12. Miller, A., Litton, J., Pachulski, A., Gupta, N., Levin, D., Spring, N., Bhattacharjee, B.: Discovering Bitcoin’s Public Topology and Influential Nodes (2015)

    Google Scholar 

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, p. 1 (2012), p. 28 (2008)

    Google Scholar 

  14. Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: 2016 International IEEE Conference on Advanced and Trusted Computing (ATC), pp. 358–367, July 2016

    Google Scholar 

  15. Nick, J.D.: Data-Driven De-Anonymization in Bitcoin. Master’s thesis, ETH-Zürich (2015)

    Google Scholar 

  16. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-4139-7_10

    Chapter  Google Scholar 

  17. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_2

    Chapter  Google Scholar 

  18. Yates, D., Moore, D., McCabe, G.: The Practice of Statistics. WH Freeman and Company, New York (1996)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the German Federal Ministry of Education and Research (BMBF) within the project \({KASTEL\_IoE}\) in the Competence Center for Applied Security Technology (KASTEL). The authors acknowledge the use of the InstitutsCluster II at the Steinbuch Centre for Computing, and would like to thank the anonymous reviewers for their valuable comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Till Neudecker .

Editor information

Editors and Affiliations

Appendix

Appendix

Figures 4 and 5 show a comparison of the resulting cluster sizes for all discussed clustering heuristics and various parameterizations of the growth based heuristic HG. For all heuristics, the cluster sizes roughly follow a power-law distribution.

Fig. 4.
figure 4

Histogram of the number of clusters for various sizes (i.e., number of addresses per cluster).

Fig. 5.
figure 5

Histogram of the number of clusters for various sizes (i.e., number of addresses per cluster).

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neudecker, T., Hartenstein, H. (2017). Could Network Information Facilitate Address Clustering in Bitcoin?. In: Brenner, M., et al. Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10323. Springer, Cham. https://doi.org/10.1007/978-3-319-70278-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70278-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70277-3

  • Online ISBN: 978-3-319-70278-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics