Skip to main content

Analyzing Blockchain Data to Detect Bitcoin Addresses Involved in Illicit Activities Using Anomaly Detection

  • Conference paper
  • First Online:
Data Science and Applications (ICDSA 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 820))

Included in the following conference series:

  • 86 Accesses

Abstract

The popularity of cryptocurrency has continued to spike in recent years, and among them, bitcoin still remains the most popular. Perhaps the biggest reason for its popularity is the blockchain technology that it is built on. While the technology prevents fraud on the network, there are no checks to track how the bitcoins are being used and for what purpose. Our study tries to investigate the block data stored on the bitcoin blockchain to gain insight and build relationships between transactions that can shed light on the transactions and identify the bitcoin addresses involved in illicit activities. This is carried out by using the HPCC systems analytics platform for ingesting the data. Anomaly detection technique has been used by using a set of specialized features based on transaction behavior where anomalies in users are examined as opposed to anomalies in individual addresses. The K-means algorithm has been used for clustering of data. This study successfully yielded addresses which were potentially involved in illicit activities including involvement in the Mt. Gox hack of 2014.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Grauer, H. Updegrave, W. Kueshner, The chainalysis 2022 crypto crime report, chainalysis. Available at: https://go.chainalysis.com/2022-Crypto-Crime-Report.html (Accessed: 2 Dec 2022)

  2. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, Oct 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf

  3. J.J. Xu, Are blockchains immune to all malicious attacks? Fin Innovation 2(1), Dec 2016. https://doi.org/10.1186/s40854-016-0046-5

  4. S. Foley, J.R. Karlsen, T.J. Putniņš, S. Drugs, Bitcoin, How much illegal activity is financed through cryptocurrencies? Rev. Financ. Stud. 32(5), 1798–1853, May 2019, https://doi.org/10.1093/rfs/hhz015

  5. S. Thudumu, P. Branch, J. Jin et al., A comprehensive survey of anomaly detection techniques for high dimensional big data. J Big Data 7, 42 (2020). https://doi.org/10.1186/s40537-020-00320-x

    Article  Google Scholar 

  6. M.J. Shayegan, H.R. Sabor, M. Uddin, C.-L. Chen, A collective anomaly detection technique to detect crypto wallet frauds on the bitcoin network. Symmetry 14, 328 (2022). https://doi.org/10.3390/sym14020328

    Article  Google Scholar 

  7. S. Na, L. Xumin, G. Yong, Research on k-means clustering algorithm: an improved k-means clustering algorithm. Third Int. Symp. Intell. Inf. Technol. Secur. Inf. 2010, 63–67 (2010). https://doi.org/10.1109/IITSI.2010.74

    Article  Google Scholar 

  8. J. Leng, M. Zhou, J.L. Zhao, Y. Huang, Y. Bian, Blockchain security: a survey of techniques and research directions. IEEE Trans Serv. Comput. 15(4), 2490–2510, 1 July-Aug 2022. https://doi.org/10.1109/TSC.2020.3038641

  9. D. Zambre, A. Shah, Analysis of bitcoin network dataset for fraud (2013). Accessed: 17 Dec 2022. [Online]. Available: http://snap.stanford.edu/class/cs224w-2013/projects2013/cs224w-030-final.pdf

  10. P. Monamo, V. Marivate, B. Twala, Unsupervised learning for robust Bitcoin fraud detection. 2016 Inf. Secur. South Afr. (ISSA), Aug 2016. https://doi.org/10.1109/issa.2016.7802939

  11. T. Pham, S. Lee, Anomaly detection in the bitcoin system—A network perspective. arXiv:1611.03942 [cs], Feb (2017), [Online]. Available: https://arxiv.org/abs/1611.03942

  12. O. Nasraoui, C.-E. Ben N’Cir (eds.) Clustering Methods for Big Data Analytics (Springer International Publishing, Cham, 2019). https://doi.org/10.1007/978-3-319-97864-2

  13. F. Qin, Y. Wu, F. Tao, L. Liu, L. Shi, A.J. Miller, Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis. Digit. Commun. Netw. (2022). https://doi.org/10.1016/j.dcan.2022.09.003

    Article  Google Scholar 

  14. Y. Zhang, J. Wang, J. Luo, Heuristic-based address clustering in bitcoin. IEEE Access 8, 210582–210591 (2020). https://doi.org/10.1109/access.2020.3039570

    Article  Google Scholar 

  15. “Bitcoin Blockchain Size,” ycharts.com. \url{https: //ycharts.com/indicators/bitcoin\_blockchain\_size#:~:text=Bitcoin\%20Blockchain\%20Size\%20is\%20at}

    Google Scholar 

  16. A. Middleton, R. Lexisnexis, and Solutions, HPCC systems: Data intensive supercomputing solutions, 2011. Accessed: 17 Dec 2022. [Online]. Available:\url{https: //cdn.hpccsystems.com/whitepapers/wp\_data\_intensive\_computing\_solutions.pdf}

    Google Scholar 

  17. A. Karthik, H. Mishra, S. Jayanth, G. Shobha, J. Shetty, Performance Skew prediction in HPCC systems. in 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2022), pp. 94–97. https://doi.org/10.1109/Confluence52989.2022.9734182

  18. Boca Raton Documentation Team, hpcc system administrator's guide, Available at: https:// cdn.hpccsystems.com/releases/CE-Candidate-8.4.2/docs/EN\_US/HPCCSystemAdministratorsGuide\_EN\_US-8.4.2-1.pdf

    Google Scholar 

  19. Boca Raton Documentation Team, Roxie: The rapid data delivery engine, HPCC Systems, Available at: https: //cdn.hpccsystems.com/releases/CE-Candidate-7.0.14/docs/EN\_US/RoxieReference\_EN\_US-7.0.14-1.pdf

    Google Scholar 

  20. J. Dean, S. Ghemawat, MapReduce: Simplified data processing on large clusters, Google Research (2004). https://research.google/pubs/pub62/

  21. M. Gardener, Beginning R: the statistical programming language (Wiley, Ukraine, 2012)

    Google Scholar 

  22. K.P. Sinaga, M.-S. Yang, Unsupervised K-Means clustering algorithm. IEEE Access 8, 80716–80727 (2020). https://doi.org/10.1109/access.2020.2988796

    Article  Google Scholar 

  23. Bitcoin Core, bitcoin.org. https://bitcoin.org/en/bitcoin-core/

  24. R. Maheshwari, Breaking down bitcoin blockchain using HPCC systems. HPCC Syst. 12 Aug 2022. https://hpccsystems.com/resources/rvce-rohanm-blockchain/ (Accessed 17 Dec 2022)

  25. What was Mt. Gox? definition, history, collapse, and future, investopedia. https://www.investopedia.com/terms/m/mt-gox.asp#:~:text=In%202014%2C%20Mt. (Accessed 17 Dec 2022)

  26. Users found at least 300k BTC of Mt Gox’s ‘missing’ coins, bitcointalk.org. https://bitcointalk.org/index.php?topic=495713.0 (Accessed 17 Dec 2022)

  27. A. Povše, U. Hercog, Taint analysis of the Bitcoin network. [Online]. Available: https://arxiv.org/pdf/1907.01538.pdf

  28. WizSec case study on craig wright versus dave Kleiman: Satoshi’s bitcoin that never existed? BitcoinExchangeGuide. https://bitcoinexchangeguide.com/wizsec-case-study-on-craig-wright-vs-dave-kleiman-satoshis-bitcoin-that-never-existed/ (Accessed 17 Dec 2022)

  29. Address: 18GfnhMxrmhqtyT88JgoX1pYVCpbyKxHyC, www.blockchain.com. \url{https://www.blockchain.com/explorer/addresses/btc/1FeexV6bAHb8ybZjqQMjJrcCrHGW9sb6uF (Accessed 17 Dec 2022)}

  30. Ask HN: Where are the 750k Bitcoins lost by Mt. Gox? | Hacker News, news.ycombinator.com. https://news.ycombinator.com/item?id=7318947 (Accessed 17 Dec 2022)

  31. J.A. Cuesta-Albertos, A. Gordaliza, C. Matrán, Trimmed $k$-means: an attempt to robustify quantizers. Ann. Stat. 25(2), Apr (1997). https://doi.org/10.1214/aos/1031833664

  32. R. Maheshwari, V. A. Sriram Praveen, G. Shobha, J. Shetty, A. Chala, Watanuki, H., Illicit activity detection in bitcoin transactions using timeseries analysis. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 14(3), (2023). https://doi.org/10.14569/IJACSA.2023.0140302

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarthak Sharan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharan, S., Sancheti, D., Shobha, G., Shetty, J., Chala, A., Watanuki, H. (2024). Analyzing Blockchain Data to Detect Bitcoin Addresses Involved in Illicit Activities Using Anomaly Detection. In: Nanda, S.J., Yadav, R.P., Gandomi, A.H., Saraswat, M. (eds) Data Science and Applications. ICDSA 2023. Lecture Notes in Networks and Systems, vol 820. Springer, Singapore. https://doi.org/10.1007/978-981-99-7817-5_11

Download citation

Publish with us

Policies and ethics