Unsupervised Approaches to Detecting Anomalous Behavior in the Bitcoin Transaction Network

نویسندگان

  • Jason Hirshman
  • Yifei Huang
چکیده

Bitcoin is an electronic crypto-currency created in 2008 by Satoshi Nakamoto (pseudonym). At the time the original bitcoin client was written, the idea of a purely peer-to-peer (P2P) digital currency which did not require a trusted-thirdparty to confirm transactions / prevent double spending was unique. In the bitcoin network, all transactions are public, effectively rendering double-spending impossible. A criminal who wishes to double-spend or falsify some segment of the transaction history must convince the majority of the bitcoin network that his transaction history is correct, but in order to do that, he must provide the appropriate proof of work. Under the assumption that the majority of the network is honest, the criminal would have to have more computational power than the majority of the network in order to falsify the transaction history, as described in [1]. Since the onset of bitcoin, several other crypto-currencies have sprung into existence, but bitcoin continues to be the most popular. Because transactions in the bitcoin network are specified by the public keys of the payer and payee, some level of anonymity is guaranteed provided public keys are not traceable to real-world identities. For criminal organizations and others using bitcoin which require strong anonymity, this is not enough, so a so-called “mixing service” is employed. The mixing service takes in bitcoins from a group of individuals requiring strong anonymity, sends the coins around randomly in an attempt to obfuscate their origins, and then sends similar amounts of bitcoins back to new addresses specified by the individuals using the service. This is discussed in more detail in [2]. For our CS229 project, we were interested in using machine learning techniques to explore a dataset of bitcoin transactions; in particular, we were interested in exploring the anonymity guarantees of the bitcoin network. The questions we were hoping to answer are:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods

The problem of anomaly detection has been studied for a long time. In short, anomalies are abnormal or unlikely things. In financial networks, thieves and illegal activities are often anomalous in nature. Members of a network want to detect anomalies as soon as possible to prevent them from harming the network’s community and integrity. Many Machine Learning techniques have been proposed to dea...

متن کامل

Anomaly Detection in the Bitcoin System - A Network Perspective

The problem of anomaly detection has been studied for a long time, and many Network Analysis techniques have been proposed as solutions. Although some results appear to be quite promising, no method is clearly to be superior to the rest. In this paper, we particularly consider anomaly detection in the Bitcoin transaction network. Our goal is to detect which users and transactions are the most s...

متن کامل

Time series forecasting of Bitcoin price based on ARIMA and machine learning approaches

Bitcoin as the current leader in cryptocurrencies is a new asset class receiving significant attention in the financial and investment community and presents an interesting time series prediction problem. In this paper, some forecasting models based on classical like ARIMA and machine learning approaches including Kriging, Artificial Neural Network (ANN), Bayesian method, Support Vector Machine...

متن کامل

Detecting frauds using customer behavior trend analysis and known scenarios

In this paper a fraud detection method is proposed which user behaviors are modeled using two main components namely the un-normal trend analysis component and scenario based component. The extent of deviation of a transaction from his/her normal behavior is estimated using fuzzy membership functions. The results of applying all membership functions on a transaction will then be infused and a f...

متن کامل

Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition

This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behavior patterns and successfully demonstrates that such models respond well to the demands and dynamic features of the problem. It illustrates the effectiveness of neural networks in the field of Intrusion Detection (ID)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013