Abstract
Long-term research has been done on anomaly identification. Its uses in the banking industry have made it easier to spot questionable hacker activity. However, it is more difficult to trick financial systems due to innovations in the financial sector like blockchain and artificial intelligence. Despite these technical developments, there have nevertheless been several instances of fraud. To address the anomaly detection issue, a variety of artificial intelligence algorithms have been put forth; while some findings seem to be remarkably encouraging, no clear winner has emerged. In order to identify fraudulent transactions, this article presented Inspection-L architecture based on graph neural network (GNN) with self-supervised deep graph infomax (DGI) and graph isomorphism network (GIN), with supervised knowledge methods, such as random forest (RF). The potential of self-supervised GNN in Bitcoin unlawful transaction detection has been demonstrated by the evaluation of the proposed technique on the Elliptic dataset. Results from experiments reveal that our approach outperforms existing standard methods for detecting anomalous events.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev 1:21260
CoinMarketCap (2022) Coinmarketcap.com. https://coinmarketcap.com/. Accessed 3 Sep 2022
Dewanta F, Mambo M (2021) Bpt scheme: establishing trusted vehicular fog computing service for rural area based on blockchain approach. IEEE Trans Vehicul Technol 70(2):1752–1769
Chen W, Zheng Z, Ngai ECH, Zheng P, Zhou Y (2019) Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7:37575–37586
Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: temporal weighted multidigraph embedding for ethereum transaction network analysis. Front Phys 8:204
Fanusie Y, Robinson T (2018) Bitcoin laundering: an analysis of illicit flows into digital currency services. In: Center on sanctions and illicit finance memorandum, January
Huang Y, Wang H, Wu L, Tyson G, Luo X, Zhang R et al (2020) Understanding (mis) behavior on the eosio blockchain. Proc ACM Measur Anal Comput Syst 4(2):1–28
Maesa DDF, Marino A, Ricci L (2017) Detecting artificial behaviours in the bitcoin users graph. Online Soc Netw Media 3:63–74
Hassan MU, Rehmani MH, Chen J (2019) DEAL: differentially private auction for blockchain-based microgrids energy trading. IEEE Trans Serv Comput 13(2):263–275
Saad M, Thai MT, Mohaisen A (2018) POSTER: deterring ddos attacks on blockchain-based cryptocurrencies through mempool optimization. In: Proceedings of the 2018 on Asia conference on computer and communications security, pp 809–811
Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun Surv Tutor 22(3):1977–2008
Velickovic P, Fedus W, Hamilton WL, Liò P, Bengio Y, Hjelm RD (2019) Deep graph infomax. ICLR 2(3):4
Feldman EV, Ruchay AN, Matveeva VK, Samsonova VD (2021) Bitcoin abnormal transaction detection based on machine learning. International conference on analysis of images, social networks and texts. Springer, Cham, pp 205–215
Liu Y, Jin M, Pan S, Zhou C, Zheng Y, Xia F, Yu P (2022) Graph self-supervised learning: a survey. IEEE Trans Knowl Data Eng 31:1
Lorenz J, Silva MI, AparÃcio D, Ascensão JT, Bizarro P (2020) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the first ACM international conference on AI in finance, pp 1–8
Pauwels EJ, Ambekar O (2011) One class classification for anomaly detection: support vector data description revisited. Industrial conference on data mining. Springer, Berlin, pp 25–39
Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui SA, Binder A, Kloft M (2018) Deep one-class classification. In: International conference on machine learning. PMLR, pp 4393–4402
Sayadi S, Rejeb SB, Choukair Z (2019) Anomaly detection model over blockchain electronic transactions. In: Proceedings of the 2019 15th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 895–900
Jablonski JA, Bihl TJ, Bauer KW (2015) Principal component reconstruction error for hyperspectral anomaly detection. IEEE Geosci Remote Sens Lett 12(8):1725–1729
Chen T, Li Z, Zhu Y, Chen J, Luo X, Lui JCS, Zhang X (2020) Understanding ethereum via graph analysis. ACM Trans Internet Technol 20(2):1–32
Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591
Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060
Lee C, Maharjan S, Ko K, Hong JWK (2020) Toward detecting illegal transactions on bitcoin using machine-learning methods. International conference on blockchain and trustworthy systems. Springer, Singapore, pp 520–533
Alarab I, Prakoonwit S, Nacer MI (2020) Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 2020 5th international conference on machine learning technologies, pp 23–27
Nan L, Tao D (2018) Bitcoin mixing detection using deep autoencoder. In: Proceedings of the 2018 IEEE third international conference on data science in cyberspace (DSC). IEEE, pp 280–287
Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941
Peng H, Yang R, Wang Z, Li J, He L, Philip SY, Ranjan R (2021) Lime: low-cost and incremental learning for dynamic heterogeneous information networks. IEEE Trans Comput 71(3):628–642
Li S, Xu F, Wang R, Zhong S (2021) Self-supervised incremental deep graph learning for ethereum phishing scam detection. arXiv preprint arXiv:2106.10176
Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907
Shervashidze N, Schweitzer P, Van Leeuwen EJ, Mehlhorn K, Borgwardt KM (2011) Weisfeiler-lehman graph kernels. J Mach Learn Res 12(9):2539–2561
Peng H, Li J, Wang S, Wang L, Gong Q, Yang R, He L (2019) Hierarchical taxonomy-aware and attentional graph capsule RCNNs for large-scale multi-label text classification. IEEE Trans Knowl Data Eng 33(6):2505–2519
Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust Bitcoin fraud detection. In: Proceedings of the 2016 information security for South Africa (ISSA). IEEE, pp 129–134
Rohe K, Chatterjee S, Yu B (2011) Spectral clustering and the high-dimensional stochastic blockmodel. Ann Stat 39(4):1878–1915
Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62–70
Shi W, Rajkumar R (2020) Point-gnn: graph neural network for 3D object detection in a point cloud. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 1711–1719
Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv preprint arXiv:1810.00826
Velickovic P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. Statistics 1050:20
Acknowledgements
The research is supported by postdoctoral fellowship granted by the Institute of Computer Technologies and Information Security, Southern Federal University, project No PD/22-02-KT.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, A., Singh, P.K., Podoplelova, E., Gavrilenko, V., Tselykh, A., Bozhenyuk, A. (2023). Graph Neural Network-Based Anomaly Detection in Blockchain Network. In: Tanwar, S., Wierzchon, S.T., Singh, P.K., Ganzha, M., Epiphaniou, G. (eds) Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security. CCCS 2022. Lecture Notes in Networks and Systems, vol 664. Springer, Singapore. https://doi.org/10.1007/978-981-99-1479-1_67
Download citation
DOI: https://doi.org/10.1007/978-981-99-1479-1_67
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1478-4
Online ISBN: 978-981-99-1479-1
eBook Packages: EngineeringEngineering (R0)