Abnormal Transaction Node Detection on Bitcoin

  • Conference paper
  • First Online:
Proceedings of the 13th International Conference on Computer Engineering and Networks (CENet 2023)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1127))

Included in the following conference series:

  • 170 Accesses

Abstract

The emergence of blockchain-based anonymous and encrypted digital currencies has brought with it a rapid increase in financial crimes. However, the regulation and detection of financial crimes requires the detection of abnormal transactions in the scenario of blockcain-based anonymous and encrypted digital currencies, where traditional methods are not applicable. In this paper, we propose an abnormal transaction node detection method on bitcoin based on outlier ranking of transaction communities. The public key addresses in bitcoin transactions are merged according to whether they belong to the same user in order to form a user transaction graph, which is used as the input of our method. This graph is then divided into smaller communities. The abnormal transaction nodes are detected by ranking each node with its inter/intra-community link outlier value. By conducting experiments on a subset of bitcoin transactions, it shows that the proposed method is able to effectively detect known abnormal nodes involved in financial crimes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: A survey. Data Mining Knowl. Discov. 29(3), 626–688 (2015)

    Article  MathSciNet  Google Scholar 

  2. Cai, S., Sun, R., Hao, S., Li, S., Yuan, G.: Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream. In: Neural Computing and Applications, pp. 1–21 (2018)

    Google Scholar 

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: A survey. IEEE Trans. Knowl. Data Engin. 24(5), 823–839 (2012)

    Article  Google Scholar 

  4. Christin, N.: Traveling the silk road: A measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 356–362 (2013)

    Google Scholar 

  5. Deters, R.: How to detect and contain suspicious transactions in distributed ledgers. In: SmartBlock, pp. 149–158. Springer, Cham (2018)

    Google Scholar 

  6. Eshghi, A., Kargari, M.: Introducing a new method for the fusion of fraud evidence in banking transactions with regards to uncertainty. Expert Syst. Appl. 121, 382–392 (2015)

    Article  Google Scholar 

  7. Fleder, M., Kester, Michael, S., Pillai, S.: Bitcoin transaction graph analysis. Comput. Sci. 102–105 (2015)

    Google Scholar 

  8. Gao, S., Xu, D.: Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst. Appl. 36(2), 1493–1504 (2009)

    Article  Google Scholar 

  9. Hirshman, J., Huang, Y., Macke, S.: Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. In: 2016 Information Security for South Africa (ISSA) (2013)

    Google Scholar 

  10. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: Characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013)

    Google Scholar 

  11. Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), pp. 34–36. San Franciso, CA, USA (2013)

    Google Scholar 

  12. Pham, T., Lee, S.: Anomaly detection in bitcoin network using unsupervised learning methods. ar**v:1611.03941 (2017)

  13. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: IEEE Third International Conference on Privacy and Security, pp. 16–20. Amsterdam, Netherlands (2012)

    Google Scholar 

  14. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, vol. 16, pp. 6–24. Springer (2013)

    Google Scholar 

  15. Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: Cluster computing with working sets. In: Proceedings of the 2Nd USENIX Conference on Hot Topics in Cloud Computing, HotCloud’10, pp. 10–10. USENIX Association, Berkeley, CA, USA (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan**g Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Lu, Y., Li, M. (2024). Abnormal Transaction Node Detection on Bitcoin. In: Zhang, Y., Qi, L., Liu, Q., Yin, G., Liu, X. (eds) Proceedings of the 13th International Conference on Computer Engineering and Networks. CENet 2023. Lecture Notes in Electrical Engineering, vol 1127. Springer, Singapore. https://doi.org/10.1007/978-981-99-9247-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9247-8_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9246-1

  • Online ISBN: 978-981-99-9247-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation