Abstract
As an emergent electronic payment system, Bitcoin has attracted attention for its desirable features such as disintermediation, decentralization, and tamper-proof recording of data. The Bitcoin network also employs public key cryptography to prevent the disclosure of information related to participating users. Although the public key cryptography ensures the privacy and hides the true identity of users in the Bitcoin network, it has recently been abused for illegal activities that have tarnished the charm of this novel technology. Detecting the illegal transactions associated with illicit activities in Bitcoin is therefore imperative. This paper proposes a machine-learning based approach that classifies Bitcoin transactions as illegal or legal. The detected illegal transactions can be excluded from the subsequent block, promoting user acceptance and adoption of the Bitcoin technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Sebastopol (2015)
Harvey, C.R.: Bitcoin myths and facts (2014)
Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote. Sens. 26(1), 217–222 (2005)
Zurada, J.M.: Introduction to Artificial Neural Systems, vol. 8. West Publishing Company, St. Paul (1992)
Zambre, D., Shah, A.: Analysis of Bitcoin network dataset for fraud. Unpublished Report (2013)
Hartigan, J.A., Wong, M.A.: Algorithm AS 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100–108 (1979)
Toyoda, K., Ohtsuki, T., Mathiopoulos, P.T.: Identification of high yielding investment programs in Bitcoin via transactions pattern analysis. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, pp. 1–6 (2017)
https://www.blockchain.com/btc/address/1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX?offset=0&filter=6
Bitcoin core. https://bitcoin.org/en/bitcoin-core
Btcoin core json apis. http://chainquery.com/bitcoin-api
Goutte, C., Gaussier, E.: A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: Losada, D.E., Fernández-Luna, J.M. (eds.) ECIR 2005. LNCS, vol. 3408, pp. 345–359. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31865-1_25
Zou, H., Hastie, T.: Regularization and variable selection via the elastic net. J. R. Stat. Soc. Ser. B (Stat. Methodol.) 67(2), 301–320 (2005)
Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)
Acknowledgments
This work was supported by the ICT R&D program of MSIT/IITP. [No. 2018-0-00539, Development of Blockchain Transaction Monitoring and Analysis Technology] This work was also supported by the ICT R&D program of MSIT/IITP. [No. 2018-0-00749, Development of virtual network management technology based on artificial intelligence].
This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2017-2017- 0-01633) supervised by the IITP (Institute for Information & communications Technology Promotion).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lee, C., Maharjan, S., Ko, K., Hong, J.WK. (2020). Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_42
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)