Abstract
Currently, immutable blockchain-based ledgers become important tools for cryptocurrency transactions, auditing, smart contracts, copyright registration and many other applications. In this regard, there is a need to analyze the typical, repetitive actions written to the ledger, for example, to identify suspicious cryptocurrency transactions, a chain of events that led to information security incident, or to predict recurrence of some situation in the future. We propose to use for these purposes the algorithms for T-patterns discovering and to cluster the identified behavioral patterns subsequently. In case of having labeled patterns, clustering might be replaced by classification.
References
Nakamoto, S.B.: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
McConaghy, T., et al.: BigchainDB: a scalable blockchain database (2016). https://www.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf
Wood, G.E.: A secure decentralized generalized transaction ledger (2017). http://gavwood.com/paper.pdf
Cosba, A., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts (2015). http://eprint.iacr.org/2015/675
Zyskind, G., Nathan, O., Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy (2016). http://www.enigma.co/enigma_full.pdf
Hardjono, T., Smith, N., Pentland, A.: Anonymous identities for permissioned blockchains (2016). http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/Anonymous-Identities-for-Permissioned-Blockchains2.pdf
Michalko, M., Sevcik, J.: DECENT whitepaper (2015). http://www.the-blockchain.com/docs/Decentralized%20Open-Source%20Content%20Distribution%20(DECENT)%20whitepaper.pdf
Matsumoto, S., Reischuk, R.: IKP: turning a PKI around with blockchains (2016). http://eprint.iacr.org/2016/1018
Cucurull, J., Puiggali, J.: Distributed immutabilization of secure logs (2017). https://www.scytl.com/wp-content/uploads/2017/01/Distributed-Immutabilization-of-Secure-Logs_Scytl.pdf
Magnusson, M.: Discovering hidden time patterns in behavior: T-patterns and their detection. Behav. Res. Methods Instrum. Comput. 32(1), 93–110 (2000)
Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Pubs, San Francisco (2012)
Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Sov. Phys. Dokl. 10(8), 707–710 (1966). (In Russian)
Wagner, R., Fischer, M.: The string-to-string correction problem. J. Assoc. Comput. Mach. 21(I), 168–173 (1974)
Ward, J.H.: Hierarchical grouping to optimize an objective function. J. Am. Stat. Assoc. 58, 236–244 (1963)
Lance, G., Williams, W.: A general theory of classificatory sorting strategies I hierarchical systems. Comput. J. 9(4), 373–380 (1967)
Tao, Y., Xiao, X., Zhou, S.: Mining distance-based outliers from large databases in any metric space. In: Proceedings of 2006 ACM SIGKDD International Conference on Knowledge Discovery in Databases (KDD 2006), Philadelphia, PA, August 2006, pp. 394–403 (2006)
Acknowledgments
Authors acknowledge support from the MEPhI Academic Excellence Project (Contract No. 02.a03.21.0005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Epishkina, A., Zapechnikov, S. (2018). Discovering and Clustering Hidden Time Patterns in Blockchain Ledger. In: Samsonovich, A., Klimov, V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, vol 636. Springer, Cham. https://doi.org/10.1007/978-3-319-63940-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-63940-6_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63939-0
Online ISBN: 978-3-319-63940-6
eBook Packages: EngineeringEngineering (R0)