Skip to main content

A Survey on Blockchain Anomaly Detection Using Data Mining Techniques

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1156))

Included in the following conference series:

Abstract

With the more and more extensive application of blockchain, blockchain security has been widely concerned by the society and deeply studied by scholars, of which anomaly detection is an important problem. Data mining techniques, including conventional machine learning, deep learning and graph learning, have been concentrated for anomaly detection in the last few years. This paper presents a systematic survey of the blockchain anomaly detection results using data mining techniques. The anomaly detection methods are classified into 2 main categories, namely universal detection methods and specific detection methods, which contain 8 subclasses. For each subclass, the corresponding research are listed and compared, presenting a systematic and categorized overview of the current perspectives for blockchain anomaly detection. In addition, this paper contributes in discussing the advantages and disadvantages for the data mining techniques employed, and suggesting future directions for anomaly detection methods. This survey helps researchers to have a general comprehension of the anomaly detection field and its application in blockchain data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Awan, M.K., Cortesi, A.: Blockchain transaction analysis using dominant sets. In: Saeed, K., Homenda, W., Chaki, R. (eds.) CISIM 2017. LNCS, vol. 10244, pp. 229–239. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59105-6_20

    Chapter  Google Scholar 

  2. Baek, H., Oh, J., Kim, C.Y., Lee, K.: A model for detecting cryptocurrency transactions with discernible purpose. In: Eleventh International Conference on Ubiquitous and Future Networks, ICUFN 2019, Zagreb, Croatia, 2–5 July 2019, pp. 713–717 (2019)

    Google Scholar 

  3. Bartoletti, M., Lande, S., Pompianu, L., Bracciali, A.: A general framework for blockchain analytics. In: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, SERIAL@Middleware 2017, Las Vegas, NV, USA, 11–15 December 2017, pp. 7:1–7:6 (2017)

    Google Scholar 

  4. Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: Crypto Valley Conference on Blockchain Technology, CVCBT 2018, Zug, Switzerland, 20–22 June 2018, pp. 75–84 (2018)

    Google Scholar 

  5. Bowyer, K.W., Chawla, N.V., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. CoRR abs/1106.1813 (2011)

    Google Scholar 

  6. Chang, T.H., Svetinovic, D.: Improving bitcoin ownership identification using transaction patterns analysis. IEEE Trans. Syst. Man Cybern. Syst. (to be published). https://doi.org/10.1109/TSMC.2018.2867497

  7. Chen, T., et al.: Understanding Ethereum via graph analysis. In: 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, 16–19 April 2018, pp. 1484–1492 (2018)

    Google Scholar 

  8. Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: evidence from mining the MT. Gox transaction network. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, 29 April–2 May 2019, pp. 964–972 (2019)

    Google Scholar 

  9. Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, E.J., Bian, J.: Detecting “pump & dump schemes” on cryptocurrency market using an improved Apriori algorithm. In: 13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, San Francisco, CA, USA, 4–9 April 2019 (2019)

    Google Scholar 

  10. Chen, W., Zheng, Z., Ngai, E.C., Zheng, P., Zhou, Y.: Exploiting blockchain data to detect smart Ponzi schemes on Ethereum. IEEE Access 7, 37575–37586 (2019)

    Article  Google Scholar 

  11. Conti, M., Gangwal, A., Ruj, S.: On the economic significance of ransomware campaigns: a bitcoin transactions perspective. Comput. Secur. 79, 162–189 (2018)

    Article  Google Scholar 

  12. Cuesta-Albertos, J.A., Gordaliza, A., Matrán, C., et al.: Trimmed \( k \)-means: an attempt to robustify quantizers. Ann. Stat. 25(2), 553–576 (1997)

    Article  MathSciNet  Google Scholar 

  13. Di Battista, G., Donato, V.D., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: BitConeView: visualization of flows in the bitcoin transaction graph. In: 2015 IEEE Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, 25 October 2015, pp. 1–8 (2015)

    Google Scholar 

  14. Eldefrawy, K., Gehani, A., Matton, A.: Longitudinal analysis of misuse of bitcoin. In: Deng, R.H., Gauthier-Umaña, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 259–278. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21568-2_13

    Chapter  Google Scholar 

  15. Gaihre, A., Pandey, S., Liu, H.: Deanonymizing cryptocurrency with graph learning: the promises and challenges. In: 7th IEEE Conference on Communications and Network Security, CNS 2019, Washington, DC, USA, 10–12 June 2019, pp. 1–3 (2019)

    Google Scholar 

  16. Harlev, M.A., Yin, H.S., Langenheldt, K.C., Mukkamala, R.R., Vatrapu, R.: Breaking bad: de-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: 51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, 3–6 January 2018, pp. 1–10 (2018)

    Google Scholar 

  17. Jourdan, M., Blandin, S., Wynter, L., Deshpande, P.: Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops, ICDM Workshops, Singapore, Singapore, 17–20 November 2018, pp. 55–62 (2018)

    Google Scholar 

  18. Juhász, P.L., Stéger, J., Kondor, D., Vattay, G.: A Bayesian approach to identify bitcoin users. PLoS ONE 13(12), e0207000 (2018)

    Article  Google Scholar 

  19. Kanemura, K., Toyoda, K., Ohtsuki, T.: Identification of darknet markets’ bitcoin addresses by voting per-address classification results. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), 14–17 May 2019, pp. 154–158 (2019)

    Google Scholar 

  20. Kim, Y., Pak, D., Lee, J.: ScanAT: identification of bytecode-only smart contracts with multiple attribute tags. IEEE Access 7, 98669–98683 (2019)

    Article  Google Scholar 

  21. Kinkeldey, C., Fekete, J., Isenberg, P.: BitConduite: visualizing and analyzing activity on the bitcoin network. In: Eurographics Conference on Visualization, EuroVis 2017, Posters, Barcelona, Spain, 12–16 June 2017, pp. 25–27 (2017)

    Google Scholar 

  22. Klusman, R., Dijkhuizen, T.: Deanonymisation in Ethereum using existing methods for bitcoin (2018)

    Google Scholar 

  23. Lin, Y., Wu, P., Hsu, C., Tu, I., Liao, S.: An evaluation of bitcoin address classification based on transaction history summarization. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), 14–17 May 2019, pp. 302–310 (2019)

    Google Scholar 

  24. Maesa, D.D.F., Marino, A., Ricci, L.: Detecting artificial behaviours in the bitcoin users graph. Online Soc. Netw. Media 3–4, 63–74 (2017)

    Article  Google Scholar 

  25. McGinn, D., McIlwraith, D., Guo, Y.: Towards open data blockchain analytics: a bitcoin perspective. R. Soc. Open Sci. 5(8), 180298 (2018)

    Article  Google Scholar 

  26. McGinn, D., Birch, D., Akroyd, D., Molina-Solana, M., Guo, Y., Knottenbelt, W.J.: Visualizing dynamic bitcoin transaction patterns. Big Data 4(2), 109–119 (2016)

    Article  Google Scholar 

  27. Monamo, P., Marivate, V.N., Twala, B.: Unsupervised learning for robust bitcoin fraud detection. In: 2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, 17–18 August 2016, pp. 129–134 (2016)

    Google Scholar 

  28. Moore, T., Han, J., Clayton, R.: The postmodern Ponzi scheme: empirical analysis of high-yield investment programs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 41–56. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_4

    Chapter  Google Scholar 

  29. Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  30. Nan, L., Tao, D.: Bitcoin mixing detection using deep autoencoder. In: Third IEEE International Conference on Data Science in Cyberspace, DSC 2018, Guangzhou, China, 18–21 June 2018, pp. 280–287 (2018)

    Google Scholar 

  31. Nilsen, A.I.: Limelight: real-time detection of pump-and-dump events on cryptocurrency exchanges using deep learning. Master’s thesis, UiT Norges arktiske universitet (2019)

    Google Scholar 

  32. O’Kane, E.: Detecting patterns in the Ethereum transactional data using unsupervised learning. Master’s thesis, UiT Norges arktiske universitet (2018)

    Google Scholar 

  33. Patil, V., Nikam, A., Pawar, J., Pardhi, M.: Bitcoin fraud detection using data mining approach. J. Inf. Technol. Sci. 4(2), 1–6 (2018)

    Google Scholar 

  34. Pham, T., Lee, S.: Anomaly detection in bitcoin network using unsupervised learning methods. CoRR abs/1611.03941 (2016)

    Google Scholar 

  35. Pham, T., Lee, S.: Anomaly detection in the bitcoin system - a network perspective. CoRR abs/1611.03942 (2016)

    Google Scholar 

  36. Prado-Romero, M.A., Doerr, C., Gago-Alonso, A.: Discovering bitcoin mixing using anomaly detection. In: Mendoza, M., Velastín, S. (eds.) CIARP 2017. LNCS, vol. 10657, pp. 534–541. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75193-1_64

    Chapter  Google Scholar 

  37. Ranshous, S., et al.: Exchange pattern mining in the bitcoin transaction directed hypergraph. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 248–263. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_16

    Chapter  Google Scholar 

  38. Sayadi, S., Rejeb, S.B., Choukair, Z.: Anomaly detection model over blockchain electronic transactions. In: 15th International Wireless Communications & Mobile Computing Conference, IWCMC 2019, Tangier, Morocco, 24–28 June 2019, pp. 895–900 (2019)

    Google Scholar 

  39. Shao, W., Li, H., Chen, M., Jia, C., Liu, C., Wang, Z.: Identifying bitcoin users using deep neural network. In: Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, 15–17 November 2018, Proceedings, Part IV, pp. 178–192 (2018)

    Google Scholar 

  40. Signorini, M., Kanoun, W., Pietro, R.D.: Advise: anomaly detection tool for blockchain systems. In: 2018 IEEE World Congress on Services, SERVICES 2018, San Francisco, CA, USA, 2–7 July 2018, pp. 65–66 (2018)

    Google Scholar 

  41. Signorini, M., Pontecorvi, M., Kanoun, W., Di Pietro, R.: Bad: blockchain anomaly detection. arXiv preprint arXiv:1807.03833 (2018)

  42. Avdoshin, S.M., Lazarenko, A.V.: Bitcoin users deanonimization methods. Trudy ISP RAN/Proc. ISP RAS 30(1), 89–102 (2018)

    Google Scholar 

  43. Tang, H., Jiao, Y., Huang, B., Lin, C., Goyal, S., Wang, B.: Learning to classify blockchain peers according to their behavior sequences. IEEE Access 6, 71208–71215 (2018)

    Article  Google Scholar 

  44. Torres, C.F., Steichen, M., State, R.: The art of the scam: demystifying honeypots in Ethereum smart contracts. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14–16 August 2019, pp. 1591–1607 (2019)

    Google Scholar 

  45. Toyoda, K., Mathiopoulos, P.T., Ohtsuki, T.: A novel methodology for HYIP operators’ bitcoin addresses identification. IEEE Access 7, 74835–74848 (2019)

    Article  Google Scholar 

  46. Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, 4–8 December 2017, pp. 1–6 (2017)

    Google Scholar 

  47. Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Multi-class bitcoin-enabled service identification based on transaction history summarization. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, 30 July–3 August 2018, pp. 1153–1160 (2018)

    Google Scholar 

  48. Wu, J., Lin, D., Zheng, Z., Yuan, Q.: T-EDGE: temporal weighted multidigraph embedding for Ethereum transaction network analysis. CoRR abs/1905.08038 (2019)

    Google Scholar 

  49. Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14–16 August 2019, pp. 1609–1625 (2019)

    Google Scholar 

  50. Yin, H.S., Langenheldt, K.C., Harlev, M.A., Mukkamala, R.R., Vatrapu, R.: Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. J. Manag. Inf. Syst. 36(1), 37–73 (2019)

    Article  Google Scholar 

  51. Yin, H.S., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In: 2017 IEEE International Conference on Big Data, BigData 2017, Boston, MA, USA, 1–14 December 2017, pp. 3690–3699 (2017)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Nos. 61772548) and the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunxiang Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, J., Gu, C., Wei, F., Chen, X. (2020). A Survey on Blockchain Anomaly Detection Using Data Mining Techniques. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2777-7_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2776-0

  • Online ISBN: 978-981-15-2777-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics