Skip to main content

Graph Neural Network-Based Anomaly Detection in Blockchain Network

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security (CCCS 2022)

Abstract

Long-term research has been done on anomaly identification. Its uses in the banking industry have made it easier to spot questionable hacker activity. However, it is more difficult to trick financial systems due to innovations in the financial sector like blockchain and artificial intelligence. Despite these technical developments, there have nevertheless been several instances of fraud. To address the anomaly detection issue, a variety of artificial intelligence algorithms have been put forth; while some findings seem to be remarkably encouraging, no clear winner has emerged. In order to identify fraudulent transactions, this article presented Inspection-L architecture based on graph neural network (GNN) with self-supervised deep graph infomax (DGI) and graph isomorphism network (GIN), with supervised knowledge methods, such as random forest (RF). The potential of self-supervised GNN in Bitcoin unlawful transaction detection has been demonstrated by the evaluation of the proposed technique on the Elliptic dataset. Results from experiments reveal that our approach outperforms existing standard methods for detecting anomalous events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev 1:21260

    Google Scholar 

  2. CoinMarketCap (2022) Coinmarketcap.com. https://coinmarketcap.com/. Accessed 3 Sep 2022

  3. Dewanta F, Mambo M (2021) Bpt scheme: establishing trusted vehicular fog computing service for rural area based on blockchain approach. IEEE Trans Vehicul Technol 70(2):1752–1769

    Article  Google Scholar 

  4. Chen W, Zheng Z, Ngai ECH, Zheng P, Zhou Y (2019) Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7:37575–37586

    Article  Google Scholar 

  5. Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: temporal weighted multidigraph embedding for ethereum transaction network analysis. Front Phys 8:204

    Article  Google Scholar 

  6. Fanusie Y, Robinson T (2018) Bitcoin laundering: an analysis of illicit flows into digital currency services. In: Center on sanctions and illicit finance memorandum, January

    Google Scholar 

  7. Huang Y, Wang H, Wu L, Tyson G, Luo X, Zhang R et al (2020) Understanding (mis) behavior on the eosio blockchain. Proc ACM Measur Anal Comput Syst 4(2):1–28

    Article  Google Scholar 

  8. Maesa DDF, Marino A, Ricci L (2017) Detecting artificial behaviours in the bitcoin users graph. Online Soc Netw Media 3:63–74

    Article  Google Scholar 

  9. Hassan MU, Rehmani MH, Chen J (2019) DEAL: differentially private auction for blockchain-based microgrids energy trading. IEEE Trans Serv Comput 13(2):263–275

    Google Scholar 

  10. Saad M, Thai MT, Mohaisen A (2018) POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization. In: Proceedings of the 2018 on Asia conference on computer and communications security, pp 809–811

    Google Scholar 

  11. Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun Surv Tutor 22(3):1977–2008

    Article  Google Scholar 

  12. Velickovic P, Fedus W, Hamilton WL, Liò P, Bengio Y, Hjelm RD (2019) Deep graph infomax. ICLR 2(3):4

    Google Scholar 

  13. Feldman EV, Ruchay AN, Matveeva VK, Samsonova VD (2021) Bitcoin abnormal transaction detection based on machine learning. International conference on analysis of images, social networks and texts. Springer, Cham, pp 205–215

    Google Scholar 

  14. Liu Y, Jin M, Pan S, Zhou C, Zheng Y, Xia F, Yu P (2022) Graph self-supervised learning: a survey. IEEE Trans Knowl Data Eng 31:1

    Google Scholar 

  15. Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P (2020) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the first ACM international conference on AI in finance, pp 1–8

    Google Scholar 

  16. Pauwels EJ, Ambekar O (2011) One class classification for anomaly detection: support vector data description revisited. Industrial conference on data mining. Springer, Berlin, pp 25–39

    Google Scholar 

  17. Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui SA, Binder A, Kloft M (2018) Deep one-class classification. In: International conference on machine learning. PMLR, pp 4393–4402

    Google Scholar 

  18. Sayadi S, Rejeb SB, Choukair Z (2019) Anomaly detection model over blockchain electronic transactions. In: Proceedings of the 2019 15th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 895–900

    Google Scholar 

  19. Jablonski JA, Bihl TJ, Bauer KW (2015) Principal component reconstruction error for hyperspectral anomaly detection. IEEE Geosci Remote Sens Lett 12(8):1725–1729

    Article  Google Scholar 

  20. Chen T, Li Z, Zhu Y, Chen J, Luo X, Lui JCS, Zhang X (2020) Understanding ethereum via graph analysis. ACM Trans Internet Technol 20(2):1–32

    Article  Google Scholar 

  21. Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591

  22. Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060

  23. Lee C, Maharjan S, Ko K, Hong JWK (2020) Toward detecting illegal transactions on bitcoin using machine-learning methods. International conference on blockchain and trustworthy systems. Springer, Singapore, pp 520–533

    Chapter  Google Scholar 

  24. Alarab I, Prakoonwit S, Nacer MI (2020) Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 2020 5th international conference on machine learning technologies, pp 23–27

    Google Scholar 

  25. Nan L, Tao D (2018) Bitcoin mixing detection using deep autoencoder. In: Proceedings of the 2018 IEEE third international conference on data science in cyberspace (DSC). IEEE, pp 280–287

    Google Scholar 

  26. Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941

  27. Peng H, Yang R, Wang Z, Li J, He L, Philip SY, Ranjan R (2021) Lime: low-cost and incremental learning for dynamic heterogeneous information networks. IEEE Trans Comput 71(3):628–642

    Article  MATH  Google Scholar 

  28. Li S, Xu F, Wang R, Zhong S (2021) Self-supervised incremental deep graph learning for ethereum phishing scam detection. arXiv preprint arXiv:2106.10176

  29. Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907

  30. Shervashidze N, Schweitzer P, Van Leeuwen EJ, Mehlhorn K, Borgwardt KM (2011) Weisfeiler-lehman graph kernels. J Mach Learn Res 12(9):2539–2561

    MathSciNet  MATH  Google Scholar 

  31. Peng H, Li J, Wang S, Wang L, Gong Q, Yang R, He L (2019) Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification. IEEE Trans Knowl Data Eng 33(6):2505–2519

    Article  Google Scholar 

  32. Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust Bitcoin fraud detection. In: Proceedings of the 2016 information security for South Africa (ISSA). IEEE, pp 129–134

    Google Scholar 

  33. Rohe K, Chatterjee S, Yu B (2011) Spectral clustering and the high-dimensional stochastic blockmodel. Ann Stat 39(4):1878–1915

    Article  MathSciNet  MATH  Google Scholar 

  34. Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62–70

    Article  Google Scholar 

  35. Shi W, Rajkumar R (2020) Point-gnn: graph neural network for 3D object detection in a point cloud. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 1711–1719

    Google Scholar 

  36. Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv preprint arXiv:1810.00826

  37. Velickovic P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. Statistics 1050:20

    Google Scholar 

Download references

Acknowledgements

The research is supported by postdoctoral fellowship granted by the Institute of Computer Technologies and Information Security, Southern Federal University, project No PD/22-02-KT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, A., Singh, P.K., Podoplelova, E., Gavrilenko, V., Tselykh, A., Bozhenyuk, A. (2023). Graph Neural Network-Based Anomaly Detection in Blockchain Network. In: Tanwar, S., Wierzchon, S.T., Singh, P.K., Ganzha, M., Epiphaniou, G. (eds) Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security. CCCS 2022. Lecture Notes in Networks and Systems, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-99-1479-1_67

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-1479-1_67

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-1478-4

  • Online ISBN: 978-981-99-1479-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics