Abstract
The popularity of cryptocurrency has continued to spike in recent years, and among them, bitcoin still remains the most popular. Perhaps the biggest reason for its popularity is the blockchain technology that it is built on. While the technology prevents fraud on the network, there are no checks to track how the bitcoins are being used and for what purpose. Our study tries to investigate the block data stored on the bitcoin blockchain to gain insight and build relationships between transactions that can shed light on the transactions and identify the bitcoin addresses involved in illicit activities. This is carried out by using the HPCC systems analytics platform for ingesting the data. Anomaly detection technique has been used by using a set of specialized features based on transaction behavior where anomalies in users are examined as opposed to anomalies in individual addresses. The K-means algorithm has been used for clustering of data. This study successfully yielded addresses which were potentially involved in illicit activities including involvement in the Mt. Gox hack of 2014.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Grauer, H. Updegrave, W. Kueshner, The chainalysis 2022 crypto crime report, chainalysis. Available at: https://go.chainalysis.com/2022-Crypto-Crime-Report.html (Accessed: 2 Dec 2022)
S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, Oct 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
J.J. Xu, Are blockchains immune to all malicious attacks? Fin Innovation 2(1), Dec 2016. https://doi.org/10.1186/s40854-016-0046-5
S. Foley, J.R. Karlsen, T.J. Putniņš, S. Drugs, Bitcoin, How much illegal activity is financed through cryptocurrencies? Rev. Financ. Stud. 32(5), 1798–1853, May 2019, https://doi.org/10.1093/rfs/hhz015
S. Thudumu, P. Branch, J. Jin et al., A comprehensive survey of anomaly detection techniques for high dimensional big data. J Big Data 7, 42 (2020). https://doi.org/10.1186/s40537-020-00320-x
M.J. Shayegan, H.R. Sabor, M. Uddin, C.-L. Chen, A collective anomaly detection technique to detect crypto wallet frauds on the bitcoin network. Symmetry 14, 328 (2022). https://doi.org/10.3390/sym14020328
S. Na, L. Xumin, G. Yong, Research on k-means clustering algorithm: an improved k-means clustering algorithm. Third Int. Symp. Intell. Inf. Technol. Secur. Inf. 2010, 63–67 (2010). https://doi.org/10.1109/IITSI.2010.74
J. Leng, M. Zhou, J.L. Zhao, Y. Huang, Y. Bian, Blockchain security: a survey of techniques and research directions. IEEE Trans Serv. Comput. 15(4), 2490–2510, 1 July-Aug 2022. https://doi.org/10.1109/TSC.2020.3038641
D. Zambre, A. Shah, Analysis of bitcoin network dataset for fraud (2013). Accessed: 17 Dec 2022. [Online]. Available: http://snap.stanford.edu/class/cs224w-2013/projects2013/cs224w-030-final.pdf
P. Monamo, V. Marivate, B. Twala, Unsupervised learning for robust Bitcoin fraud detection. 2016 Inf. Secur. South Afr. (ISSA), Aug 2016. https://doi.org/10.1109/issa.2016.7802939
T. Pham, S. Lee, Anomaly detection in the bitcoin system—A network perspective. arXiv:1611.03942 [cs], Feb (2017), [Online]. Available: https://arxiv.org/abs/1611.03942
O. Nasraoui, C.-E. Ben N’Cir (eds.) Clustering Methods for Big Data Analytics (Springer International Publishing, Cham, 2019). https://doi.org/10.1007/978-3-319-97864-2
F. Qin, Y. Wu, F. Tao, L. Liu, L. Shi, A.J. Miller, Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis. Digit. Commun. Netw. (2022). https://doi.org/10.1016/j.dcan.2022.09.003
Y. Zhang, J. Wang, J. Luo, Heuristic-based address clustering in bitcoin. IEEE Access 8, 210582–210591 (2020). https://doi.org/10.1109/access.2020.3039570
“Bitcoin Blockchain Size,” ycharts.com. \url{https: //ycharts.com/indicators/bitcoin\_blockchain\_size#:~:text=Bitcoin\%20Blockchain\%20Size\%20is\%20at}
A. Middleton, R. Lexisnexis, and Solutions, HPCC systems: Data intensive supercomputing solutions, 2011. Accessed: 17 Dec 2022. [Online]. Available:\url{https: //cdn.hpccsystems.com/whitepapers/wp\_data\_intensive\_computing\_solutions.pdf}
A. Karthik, H. Mishra, S. Jayanth, G. Shobha, J. Shetty, Performance Skew prediction in HPCC systems. in 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2022), pp. 94–97. https://doi.org/10.1109/Confluence52989.2022.9734182
Boca Raton Documentation Team, hpcc system administrator's guide, Available at: https:// cdn.hpccsystems.com/releases/CE-Candidate-8.4.2/docs/EN\_US/HPCCSystemAdministratorsGuide\_EN\_US-8.4.2-1.pdf
Boca Raton Documentation Team, Roxie: The rapid data delivery engine, HPCC Systems, Available at: https: //cdn.hpccsystems.com/releases/CE-Candidate-7.0.14/docs/EN\_US/RoxieReference\_EN\_US-7.0.14-1.pdf
J. Dean, S. Ghemawat, MapReduce: Simplified data processing on large clusters, Google Research (2004). https://research.google/pubs/pub62/
M. Gardener, Beginning R: the statistical programming language (Wiley, Ukraine, 2012)
K.P. Sinaga, M.-S. Yang, Unsupervised K-Means clustering algorithm. IEEE Access 8, 80716–80727 (2020). https://doi.org/10.1109/access.2020.2988796
Bitcoin Core, bitcoin.org. https://bitcoin.org/en/bitcoin-core/
R. Maheshwari, Breaking down bitcoin blockchain using HPCC systems. HPCC Syst. 12 Aug 2022. https://hpccsystems.com/resources/rvce-rohanm-blockchain/ (Accessed 17 Dec 2022)
What was Mt. Gox? definition, history, collapse, and future, investopedia. https://www.investopedia.com/terms/m/mt-gox.asp#:~:text=In%202014%2C%20Mt. (Accessed 17 Dec 2022)
Users found at least 300k BTC of Mt Gox’s ‘missing’ coins, bitcointalk.org. https://bitcointalk.org/index.php?topic=495713.0 (Accessed 17 Dec 2022)
A. Povše, U. Hercog, Taint analysis of the Bitcoin network. [Online]. Available: https://arxiv.org/pdf/1907.01538.pdf
WizSec case study on craig wright versus dave Kleiman: Satoshi’s bitcoin that never existed? BitcoinExchangeGuide. https://bitcoinexchangeguide.com/wizsec-case-study-on-craig-wright-vs-dave-kleiman-satoshis-bitcoin-that-never-existed/ (Accessed 17 Dec 2022)
Address: 18GfnhMxrmhqtyT88JgoX1pYVCpbyKxHyC, www.blockchain.com. \url{https://www.blockchain.com/explorer/addresses/btc/1FeexV6bAHb8ybZjqQMjJrcCrHGW9sb6uF (Accessed 17 Dec 2022)}
Ask HN: Where are the 750k Bitcoins lost by Mt. Gox? | Hacker News, news.ycombinator.com. https://news.ycombinator.com/item?id=7318947 (Accessed 17 Dec 2022)
J.A. Cuesta-Albertos, A. Gordaliza, C. Matrán, Trimmed $k$-means: an attempt to robustify quantizers. Ann. Stat. 25(2), Apr (1997). https://doi.org/10.1214/aos/1031833664
R. Maheshwari, V. A. Sriram Praveen, G. Shobha, J. Shetty, A. Chala, Watanuki, H., Illicit activity detection in bitcoin transactions using timeseries analysis. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 14(3), (2023). https://doi.org/10.14569/IJACSA.2023.0140302
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharan, S., Sancheti, D., Shobha, G., Shetty, J., Chala, A., Watanuki, H. (2024). Analyzing Blockchain Data to Detect Bitcoin Addresses Involved in Illicit Activities Using Anomaly Detection. In: Nanda, S.J., Yadav, R.P., Gandomi, A.H., Saraswat, M. (eds) Data Science and Applications. ICDSA 2023. Lecture Notes in Networks and Systems, vol 820. Springer, Singapore. https://doi.org/10.1007/978-981-99-7817-5_11
Download citation
DOI: https://doi.org/10.1007/978-981-99-7817-5_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7816-8
Online ISBN: 978-981-99-7817-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)