Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 34 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 27 tok/s Pro
GPT-5 High 30 tok/s Pro
GPT-4o 80 tok/s Pro
Kimi K2 198 tok/s Pro
GPT OSS 120B 461 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis (2401.03530v1)

Published 7 Jan 2024 in cs.LG and cs.CR

Abstract: As the use of Blockchain for digital payments continues to rise in popularity, it also becomes susceptible to various malicious attacks. Successfully detecting anomalies within Blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in Blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. Although several studies have been conducted in the field, a limitation persists: the lack of explanations for the model's predictions. This study seeks to overcome this limitation by integrating eXplainable Artificial Intelligence (XAI) techniques and anomaly rules into tree-based ensemble classifiers for detecting anomalous Bitcoin transactions. The Shapley Additive exPlanation (SHAP) method is employed to measure the contribution of each feature, and it is compatible with ensemble models. Moreover, we present rules for interpreting whether a Bitcoin transaction is anomalous or not. Additionally, we have introduced an under-sampling algorithm named XGBCLUS, designed to balance anomalous and non-anomalous transaction data. This algorithm is compared against other commonly used under-sampling and over-sampling techniques. Finally, the outcomes of various tree-based single classifiers are compared with those of stacking and voting ensemble classifiers. Our experimental results demonstrate that: (i) XGBCLUS enhances TPR and ROC-AUC scores compared to state-of-the-art under-sampling and over-sampling techniques, and (ii) our proposed ensemble classifiers outperform traditional single tree-based machine learning classifiers in terms of accuracy, TPR, and FPR scores.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (60)
  1. Class balancing framework for credit card fraud detection based on clustering and similarity-based selection (sbs). International Journal of Information Technology 15, 325–333.
  2. Comparative performance of tree based machine learning classifiers in product backorder prediction, in: International Conference on Intelligent Computing & Optimization, Springer. pp. 572–584.
  3. A comparative analysis of cgan-based oversampling for anomaly detection. IET Cyber-Physical Systems: Theory & Applications 7, 40–50.
  4. Effect of data resampling on feature importance in imbalanced blockchain data: Comparison studies of resampling techniques. Data Science and Management 5, 66–76.
  5. Comparative analysis using supervised learning methods for anti-money laundering in bitcoin, in: Proceedings of the 2020 5th international conference on machine learning technologies, pp. 11–17.
  6. An insider threat detection model using one-hot encoding and near-miss under-sampling techniques, in: Proceedings of International Joint Conference on Advances in Computational Intelligence: IJCACI 2021, Springer. pp. 183–196.
  7. Analysis of unsupervised learning algorithms for anomaly mining with bitcoin, in: Machine Intelligence and Smart Systems. Springer, pp. 365–373.
  8. A machine learning and blockchain based efficient fraud detection mechanism. Sensors 22, 7162.
  9. A random forest guided tour. Test 25, 197–227.
  10. Bitcoin theft detection based on supervised machine learning algorithms. Security and Communication Networks 2021.
  11. Xgboost: extreme gradient boosting. R package version 0.4-2 1, 1–4.
  12. Machine learning techniques for anti-money laundering (aml) solutions in suspicious transaction detection: a review. Knowledge and Information Systems 57, 245–285.
  13. Credit card fraud detection using machine learning algorithms. Procedia computer science 165, 631–641.
  14. Machine learning for anomaly detection. performance study considering anomaly distribution in an imbalanced dataset, in: 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), IEEE. pp. 1–8.
  15. An overview of classification algorithms for imbalanced datasets. International Journal of Emerging Technology and Advanced Engineering 2, 42–47.
  16. Handling class imbalance problem using oversampling techniques: A review, in: 2017 international conference on advances in computing, communications and informatics (ICACCI), IEEE. pp. 79–85.
  17. Oversampling techniques for detecting bitcoin illegal transactions, in: 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), IEEE. pp. 330–333.
  18. Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials .
  19. Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network. Technical report, Stanford University .
  20. Comparison and analysis of logistic regression, naïve bayes and knn machine learning algorithms for credit card fraud detection. International Journal of Information Technology 13, 1503–1511.
  21. Binary logistic regression. Best practices in quantitative methods , 358–384.
  22. Identifying illicit addresses in bitcoin network, in: Blockchain and Trustworthy Systems: Second International Conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers 2, Springer. pp. 99–111.
  23. Exploratory undersampling for class-imbalance learning. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39, 539–550.
  24. Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity, in: Proceedings of the First ACM International Conference on AI in Finance, pp. 1–8.
  25. A unified approach to interpreting model predictions. Advances in neural information processing systems 30.
  26. Unsupervised learning for robust bitcoin fraud detection, in: 2016 Information Security for South Africa (ISSA), IEEE. pp. 129–134.
  27. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7, 117134–117151.
  28. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review , 21260.
  29. Gradient boosting machines, a tutorial. Frontiers in neurorobotics 7, 21.
  30. Blockchain. Business & Information Systems Engineering 59, 183–187.
  31. Improving performance of intrusion detection system using ensemble methods and feature selection, in: Proceedings of the Australasian computer science week multiconference, pp. 1–6.
  32. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 .
  33. Evaluation performance recall and f2 score of credit card fraud detection unbalanced dataset using smote oversampling technique, in: Journal of Physics: Conference Series, IOP Publishing. p. 042002.
  34. A stacking ensemble for network intrusion detection using heterogeneous datasets. Security and Communication Networks 2020, 1–9.
  35. A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence 52, 9768–9781.
  36. " why should i trust you?" explaining the predictions of any classifier, in: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp. 1135–1144.
  37. Adaboost and the super bowl of classifiers a tutorial introduction to adaptive boosting. Freie University, Berlin, Tech. Rep .
  38. Handling imbalanced data: a survey, in: International Proceedings on Advances in Soft Computing, Intelligent Systems and Applications: ASISA 2016, Springer. pp. 431–443.
  39. Partitioning attacks on bitcoin: Colliding space, time, and logic, in: 2019 IEEE 39th international conference on distributed computing systems (ICDCS), IEEE. pp. 1175–1187.
  40. Random undersampling on imbalance time series data for anomaly detection, in: Proceedings of the 2021 4th International Conference on Machine Learning and Machine Intelligence, pp. 151–156.
  41. Data science and analytics: an overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science 2, 377.
  42. Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects. Annals of Data Science 10, 1473–1498.
  43. Anomaly detection model over blockchain electronic transactions, in: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE. pp. 895–900.
  44. Anomaly detection model over blockchain electronic transactions, in: 2019 15th international wireless communications & mobile computing conference (IWCMC), IEEE. pp. 895–900.
  45. A deep learning approach for detecting security attacks on blockchain., in: ITASEC, pp. 212–222.
  46. Anomaly detection in blockchain. Master’s thesis.
  47. A survey on decision tree algorithms of classification in data mining. International Journal of Science and Research (IJSR) 5, 2094–2097.
  48. Advise: anomaly detection tool for blockchain systems, in: 2018 IEEE World Congress on Services (SERVICES), IEEE. pp. 65–66.
  49. Anomaly detection in the ethereum network. A thesis for the degree of Master of Technology/Indian Institute of Technology Kanpur .
  50. Application of balancing techniques with ensemble approach for credit card fraud detection, in: 2019 International Conference on Computing, Power and Communication Technologies (GUCON), IEEE. pp. 753–758.
  51. Ethereum: state of knowledge and research perspectives, in: Foundations and Practice of Security: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers 10, Springer. pp. 206–221.
  52. Explainable artificial intelligence for pharmacovigilance: What features are important when predicting adverse outcomes? Computer Methods and Programs in Biomedicine 212, 106415.
  53. Multi-label classification with weighted classifier selection and stacked ensemble. Information Sciences 557, 421–442.
  54. Random forest for credit card fraud detection, in: 2018 IEEE 15th international conference on networking, sensing and control (ICNSC), IEEE. pp. 1–6.
  55. Blockchain technology overview. arXiv preprint arXiv:1906.11078 .
  56. Voting-based ensemble model for network anomaly detection, in: ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. pp. 8543–8547.
  57. Ffd: A federated learning based method for credit card fraud detection, in: Big Data–BigData 2019: 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings 8, Springer. pp. 18–32.
  58. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning, in: 2017 IEEE international conference on big data (Big Data), IEEE. pp. 3690–3699.
  59. Blockchain intelligence: When blockchain meets artificial intelligence. arXiv preprint arXiv:1912.06485 .
  60. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer networks 174, 107247.
Citations (8)

Summary

We haven't generated a summary for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com