Skip to main content

Discovering and Clustering Hidden Time Patterns in Blockchain Ledger

  • Conference paper
  • First Online:
Biologically Inspired Cognitive Architectures (BICA) for Young Scientists (BICA 2017)

Abstract

Currently, immutable blockchain-based ledgers become important tools for cryptocurrency transactions, auditing, smart contracts, copyright registration and many other applications. In this regard, there is a need to analyze the typical, repetitive actions written to the ledger, for example, to identify suspicious cryptocurrency transactions, a chain of events that led to information security incident, or to predict recurrence of some situation in the future. We propose to use for these purposes the algorithms for T-patterns discovering and to cluster the identified behavioral patterns subsequently. In case of having labeled patterns, clustering might be replaced by classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Nakamoto, S.B.: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  2. McConaghy, T., et al.: BigchainDB: a scalable blockchain database (2016). https://www.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf

  3. Wood, G.E.: A secure decentralized generalized transaction ledger (2017). http://gavwood.com/paper.pdf

  4. Cosba, A., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts (2015). http://eprint.iacr.org/2015/675

  5. Zyskind, G., Nathan, O., Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy (2016). http://www.enigma.co/enigma_full.pdf

  6. Hardjono, T., Smith, N., Pentland, A.: Anonymous identities for permissioned blockchains (2016). http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/Anonymous-Identities-for-Permissioned-Blockchains2.pdf

  7. Michalko, M., Sevcik, J.: DECENT whitepaper (2015). http://www.the-blockchain.com/docs/Decentralized%20Open-Source%20Content%20Distribution%20(DECENT)%20whitepaper.pdf

  8. Matsumoto, S., Reischuk, R.: IKP: turning a PKI around with blockchains (2016). http://eprint.iacr.org/2016/1018

  9. Cucurull, J., Puiggali, J.: Distributed immutabilization of secure logs (2017). https://www.scytl.com/wp-content/uploads/2017/01/Distributed-Immutabilization-of-Secure-Logs_Scytl.pdf

  10. Magnusson, M.: Discovering hidden time patterns in behavior: T-patterns and their detection. Behav. Res. Methods Instrum. Comput. 32(1), 93–110 (2000)

    Article  Google Scholar 

  11. Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Pubs, San Francisco (2012)

    Book  Google Scholar 

  12. Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Sov. Phys. Dokl. 10(8), 707–710 (1966). (In Russian)

    MathSciNet  Google Scholar 

  13. Wagner, R., Fischer, M.: The string-to-string correction problem. J. Assoc. Comput. Mach. 21(I), 168–173 (1974)

    Article  MathSciNet  Google Scholar 

  14. Ward, J.H.: Hierarchical grouping to optimize an objective function. J. Am. Stat. Assoc. 58, 236–244 (1963)

    Article  MathSciNet  Google Scholar 

  15. Lance, G., Williams, W.: A general theory of classificatory sorting strategies I hierarchical systems. Comput. J. 9(4), 373–380 (1967)

    Article  Google Scholar 

  16. Tao, Y., Xiao, X., Zhou, S.: Mining distance-based outliers from large databases in any metric space. In: Proceedings of 2006 ACM SIGKDD International Conference on Knowledge Discovery in Databases (KDD 2006), Philadelphia, PA, August 2006, pp. 394–403 (2006)

    Google Scholar 

Download references

Acknowledgments

Authors acknowledge support from the MEPhI Academic Excellence Project (Contract No. 02.a03.21.0005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Epishkina .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Epishkina, A., Zapechnikov, S. (2018). Discovering and Clustering Hidden Time Patterns in Blockchain Ledger. In: Samsonovich, A., Klimov, V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, vol 636. Springer, Cham. https://doi.org/10.1007/978-3-319-63940-6_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63940-6_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63939-0

  • Online ISBN: 978-3-319-63940-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics