Bitcoin Fraudulent Transaction Detection Vulnerability

  • Conference paper
  • First Online:
Agents and Multi-agent Systems: Technologies and Applications 2023 (KES-AMSTA 2023)

Abstract

Bitcoin is expected to play a vital role in the web3 and is attracting attention. Still, it is notorious as a hotbed for various fraudulent transactions, which are on the rise. One of the characteristics of Bitcoin is its anonymity. Bitcoin allows tracing transactions, but the owner cannot be identified. In addition, bitcoin is considered more difficult to trace criminals than bank transactions because of the unlimited number of addresses that can be created. This study shows that it is possible to detect criminal transactions with known transaction patterns using supervised learning. Still, it is difficult to detect criminal transactions with unknown transaction patterns using supervised learning. We also show that even with anomaly detection methods, illicit transactions are difficult to detect. From the above, we believe that Bitcoin is vulnerable to illicit transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto Institute. Bitcoin.Org (2008)

    Google Scholar 

  2. Weber, M., Domeniconi, G., Chen, J., Weidele, D.K.I., Bellei, C., Robinson, T., Leiserson, C.E.: Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics (2019)

    Google Scholar 

  3. Alarab, I., Prakoonwit, S.: Effect of data resampling on feature importance in im-balanced blockchain data: Comparison studies of resampling techniques. Data Sci. Manage. 5, 66–76 (2022). https://doi.org/10.1016/j.dsm.2022.04.003

    Article  Google Scholar 

  4. Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the Ethereum blockchain. Expert Syst. Appl. 150, (2020). https://doi.org/10.1016/j.eswa.2020.113318

  5. Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in Bitcoin network. In: Communications in Computer and Information Science (2020). https://doi.org/10.1007/978-981-15-9213-3_8

  6. Lo, W.W., Sarhan, M., Layeghy, S., Portmann, M.: Inspection-L: A self-supervised GNN-based money laundering detection system for Bitcoin.

    Google Scholar 

  7. Nicholls, J., Kuppa, A., Le-Khac, N.A.: Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape. IEEE Access 9, 163965–163986 (2021). https://doi.org/10.1109/ACCESS.2021.3134076

    Article  Google Scholar 

  8. Pocher, N., Zichichi, M., Merizzi, F., Shafiq, M.Z., Ferretti, S.: Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics (2022)

    Google Scholar 

  9. Vassallo, D., Vella, V., Ellul, J.: Application of Gradient Boosting Algorithms for Anti-money Laundering in Cryptocurrencies. SN Comput. Sci. 2 (2021). https://doi.org/10.1007/s42979-021-00558-z

  10. Bynagari, N.B.: Anti-money laundering recognition through the gradient boosting classifier

    Google Scholar 

  11. Sogabe, T.: Anomaly Detection by Python. Ohmsha, Tokyo (2021)

    Google Scholar 

  12. NetworkX Homepage, https://networkx.org/, Last accessed 22 Feb 2023

Download references

Acknowledgements

This research was supported by Telecommunications Advancement Foundation and JSPS KAKENHI Grant Number JP20K01751.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takashi Ehara .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ehara, T., Takahashi, H. (2023). Bitcoin Fraudulent Transaction Detection Vulnerability. In: Jezic, G., Chen-Burger, J., Kusek, M., Sperka, R., Howlett, R.J., Jain, L.C. (eds) Agents and Multi-agent Systems: Technologies and Applications 2023. KES-AMSTA 2023. Smart Innovation, Systems and Technologies, vol 354. Springer, Singapore. https://doi.org/10.1007/978-981-99-3068-5_17

Download citation

Publish with us

Policies and ethics

Navigation