Abstract
With the more and more extensive application of blockchain, blockchain security has been widely concerned by the society and deeply studied by scholars, of which anomaly detection is an important problem. Data mining techniques, including conventional machine learning, deep learning and graph learning, have been concentrated for anomaly detection in the last few years. This paper presents a systematic survey of the blockchain anomaly detection results using data mining techniques. The anomaly detection methods are classified into 2 main categories, namely universal detection methods and specific detection methods, which contain 8 subclasses. For each subclass, the corresponding research are listed and compared, presenting a systematic and categorized overview of the current perspectives for blockchain anomaly detection. In addition, this paper contributes in discussing the advantages and disadvantages for the data mining techniques employed, and suggesting future directions for anomaly detection methods. This survey helps researchers to have a general comprehension of the anomaly detection field and its application in blockchain data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Awan, M.K., Cortesi, A.: Blockchain transaction analysis using dominant sets. In: Saeed, K., Homenda, W., Chaki, R. (eds.) CISIM 2017. LNCS, vol. 10244, pp. 229–239. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59105-6_20
Baek, H., Oh, J., Kim, C.Y., Lee, K.: A model for detecting cryptocurrency transactions with discernible purpose. In: Eleventh International Conference on Ubiquitous and Future Networks, ICUFN 2019, Zagreb, Croatia, 2–5 July 2019, pp. 713–717 (2019)
Bartoletti, M., Lande, S., Pompianu, L., Bracciali, A.: A general framework for blockchain analytics. In: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, SERIAL@Middleware 2017, Las Vegas, NV, USA, 11–15 December 2017, pp. 7:1–7:6 (2017)
Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: Crypto Valley Conference on Blockchain Technology, CVCBT 2018, Zug, Switzerland, 20–22 June 2018, pp. 75–84 (2018)
Bowyer, K.W., Chawla, N.V., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. CoRR abs/1106.1813 (2011)
Chang, T.H., Svetinovic, D.: Improving bitcoin ownership identification using transaction patterns analysis. IEEE Trans. Syst. Man Cybern. Syst. (to be published). https://doi.org/10.1109/TSMC.2018.2867497
Chen, T., et al.: Understanding Ethereum via graph analysis. In: 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, 16–19 April 2018, pp. 1484–1492 (2018)
Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: evidence from mining the MT. Gox transaction network. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, 29 April–2 May 2019, pp. 964–972 (2019)
Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, E.J., Bian, J.: Detecting “pump & dump schemes” on cryptocurrency market using an improved Apriori algorithm. In: 13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, San Francisco, CA, USA, 4–9 April 2019 (2019)
Chen, W., Zheng, Z., Ngai, E.C., Zheng, P., Zhou, Y.: Exploiting blockchain data to detect smart Ponzi schemes on Ethereum. IEEE Access 7, 37575–37586 (2019)
Conti, M., Gangwal, A., Ruj, S.: On the economic significance of ransomware campaigns: a bitcoin transactions perspective. Comput. Secur. 79, 162–189 (2018)
Cuesta-Albertos, J.A., Gordaliza, A., Matrán, C., et al.: Trimmed \( k \)-means: an attempt to robustify quantizers. Ann. Stat. 25(2), 553–576 (1997)
Di Battista, G., Donato, V.D., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: BitConeView: visualization of flows in the bitcoin transaction graph. In: 2015 IEEE Symposium on Visualization for Cyber Security, VizSec 2015, Chicago, IL, USA, 25 October 2015, pp. 1–8 (2015)
Eldefrawy, K., Gehani, A., Matton, A.: Longitudinal analysis of misuse of bitcoin. In: Deng, R.H., Gauthier-Umaña, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 259–278. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21568-2_13
Gaihre, A., Pandey, S., Liu, H.: Deanonymizing cryptocurrency with graph learning: the promises and challenges. In: 7th IEEE Conference on Communications and Network Security, CNS 2019, Washington, DC, USA, 10–12 June 2019, pp. 1–3 (2019)
Harlev, M.A., Yin, H.S., Langenheldt, K.C., Mukkamala, R.R., Vatrapu, R.: Breaking bad: de-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: 51st Hawaii International Conference on System Sciences, HICSS 2018, Hilton Waikoloa Village, Hawaii, USA, 3–6 January 2018, pp. 1–10 (2018)
Jourdan, M., Blandin, S., Wynter, L., Deshpande, P.: Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops, ICDM Workshops, Singapore, Singapore, 17–20 November 2018, pp. 55–62 (2018)
Juhász, P.L., Stéger, J., Kondor, D., Vattay, G.: A Bayesian approach to identify bitcoin users. PLoS ONE 13(12), e0207000 (2018)
Kanemura, K., Toyoda, K., Ohtsuki, T.: Identification of darknet markets’ bitcoin addresses by voting per-address classification results. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), 14–17 May 2019, pp. 154–158 (2019)
Kim, Y., Pak, D., Lee, J.: ScanAT: identification of bytecode-only smart contracts with multiple attribute tags. IEEE Access 7, 98669–98683 (2019)
Kinkeldey, C., Fekete, J., Isenberg, P.: BitConduite: visualizing and analyzing activity on the bitcoin network. In: Eurographics Conference on Visualization, EuroVis 2017, Posters, Barcelona, Spain, 12–16 June 2017, pp. 25–27 (2017)
Klusman, R., Dijkhuizen, T.: Deanonymisation in Ethereum using existing methods for bitcoin (2018)
Lin, Y., Wu, P., Hsu, C., Tu, I., Liao, S.: An evaluation of bitcoin address classification based on transaction history summarization. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2019, Seoul, Korea (South), 14–17 May 2019, pp. 302–310 (2019)
Maesa, D.D.F., Marino, A., Ricci, L.: Detecting artificial behaviours in the bitcoin users graph. Online Soc. Netw. Media 3–4, 63–74 (2017)
McGinn, D., McIlwraith, D., Guo, Y.: Towards open data blockchain analytics: a bitcoin perspective. R. Soc. Open Sci. 5(8), 180298 (2018)
McGinn, D., Birch, D., Akroyd, D., Molina-Solana, M., Guo, Y., Knottenbelt, W.J.: Visualizing dynamic bitcoin transaction patterns. Big Data 4(2), 109–119 (2016)
Monamo, P., Marivate, V.N., Twala, B.: Unsupervised learning for robust bitcoin fraud detection. In: 2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, 17–18 August 2016, pp. 129–134 (2016)
Moore, T., Han, J., Clayton, R.: The postmodern Ponzi scheme: empirical analysis of high-yield investment programs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 41–56. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_4
Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)
Nan, L., Tao, D.: Bitcoin mixing detection using deep autoencoder. In: Third IEEE International Conference on Data Science in Cyberspace, DSC 2018, Guangzhou, China, 18–21 June 2018, pp. 280–287 (2018)
Nilsen, A.I.: Limelight: real-time detection of pump-and-dump events on cryptocurrency exchanges using deep learning. Master’s thesis, UiT Norges arktiske universitet (2019)
O’Kane, E.: Detecting patterns in the Ethereum transactional data using unsupervised learning. Master’s thesis, UiT Norges arktiske universitet (2018)
Patil, V., Nikam, A., Pawar, J., Pardhi, M.: Bitcoin fraud detection using data mining approach. J. Inf. Technol. Sci. 4(2), 1–6 (2018)
Pham, T., Lee, S.: Anomaly detection in bitcoin network using unsupervised learning methods. CoRR abs/1611.03941 (2016)
Pham, T., Lee, S.: Anomaly detection in the bitcoin system - a network perspective. CoRR abs/1611.03942 (2016)
Prado-Romero, M.A., Doerr, C., Gago-Alonso, A.: Discovering bitcoin mixing using anomaly detection. In: Mendoza, M., Velastín, S. (eds.) CIARP 2017. LNCS, vol. 10657, pp. 534–541. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75193-1_64
Ranshous, S., et al.: Exchange pattern mining in the bitcoin transaction directed hypergraph. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 248–263. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_16
Sayadi, S., Rejeb, S.B., Choukair, Z.: Anomaly detection model over blockchain electronic transactions. In: 15th International Wireless Communications & Mobile Computing Conference, IWCMC 2019, Tangier, Morocco, 24–28 June 2019, pp. 895–900 (2019)
Shao, W., Li, H., Chen, M., Jia, C., Liu, C., Wang, Z.: Identifying bitcoin users using deep neural network. In: Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, 15–17 November 2018, Proceedings, Part IV, pp. 178–192 (2018)
Signorini, M., Kanoun, W., Pietro, R.D.: Advise: anomaly detection tool for blockchain systems. In: 2018 IEEE World Congress on Services, SERVICES 2018, San Francisco, CA, USA, 2–7 July 2018, pp. 65–66 (2018)
Signorini, M., Pontecorvi, M., Kanoun, W., Di Pietro, R.: Bad: blockchain anomaly detection. arXiv preprint arXiv:1807.03833 (2018)
Avdoshin, S.M., Lazarenko, A.V.: Bitcoin users deanonimization methods. Trudy ISP RAN/Proc. ISP RAS 30(1), 89–102 (2018)
Tang, H., Jiao, Y., Huang, B., Lin, C., Goyal, S., Wang, B.: Learning to classify blockchain peers according to their behavior sequences. IEEE Access 6, 71208–71215 (2018)
Torres, C.F., Steichen, M., State, R.: The art of the scam: demystifying honeypots in Ethereum smart contracts. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14–16 August 2019, pp. 1591–1607 (2019)
Toyoda, K., Mathiopoulos, P.T., Ohtsuki, T.: A novel methodology for HYIP operators’ bitcoin addresses identification. IEEE Access 7, 74835–74848 (2019)
Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Identification of high yielding investment programs in bitcoin via transactions pattern analysis. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, 4–8 December 2017, pp. 1–6 (2017)
Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Multi-class bitcoin-enabled service identification based on transaction history summarization. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, 30 July–3 August 2018, pp. 1153–1160 (2018)
Wu, J., Lin, D., Zheng, Z., Yuan, Q.: T-EDGE: temporal weighted multidigraph embedding for Ethereum transaction network analysis. CoRR abs/1905.08038 (2019)
Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, 14–16 August 2019, pp. 1609–1625 (2019)
Yin, H.S., Langenheldt, K.C., Harlev, M.A., Mukkamala, R.R., Vatrapu, R.: Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. J. Manag. Inf. Syst. 36(1), 37–73 (2019)
Yin, H.S., Vatrapu, R.: A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In: 2017 IEEE International Conference on Big Data, BigData 2017, Boston, MA, USA, 1–14 December 2017, pp. 3690–3699 (2017)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Nos. 61772548) and the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, J., Gu, C., Wei, F., Chen, X. (2020). A Survey on Blockchain Anomaly Detection Using Data Mining Techniques. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_40
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)