Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

From Asset Flow to Status, Action and Intention Discovery: Early Malice Detection in Cryptocurrency (2309.15133v1)

Published 26 Sep 2023 in cs.LG and cs.AI

Abstract: Cryptocurrency has been subject to illicit activities probably more often than traditional financial assets due to the pseudo-anonymous nature of its transacting entities. An ideal detection model is expected to achieve all three critical properties of (I) early detection, (II) good interpretability, and (III) versatility for various illicit activities. However, existing solutions cannot meet all these requirements, as most of them heavily rely on deep learning without interpretability and are only available for retrospective analysis of a specific illicit type. To tackle all these challenges, we propose Intention-Monitor for early malice detection in Bitcoin (BTC), where the on-chain record data for a certain address are much scarcer than other cryptocurrency platforms. We first define asset transfer paths with the Decision-Tree based feature Selection and Complement (DT-SC) to build different feature sets for different malice types. Then, the Status/Action Proposal Module (S/A-PM) and the Intention-VAE module generate the status, action, intent-snippet, and hidden intent-snippet embedding. With all these modules, our model is highly interpretable and can detect various illegal activities. Moreover, well-designed loss functions further enhance the prediction speed and model's interpretability. Extensive experiments on three real-world datasets demonstrate that our proposed algorithm outperforms the state-of-the-art methods. Furthermore, additional case studies justify our model can not only explain existing illicit patterns but can also find new suspicious characters.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (58)
  1. Chainnet: Learning on blockchain graphs with topological features. In 2019 IEEE international conference on data mining (ICDM). IEEE, 946–951.
  2. BitcoinHeist: Topological data analysis for ransomware detection on the bitcoin blockchain. arXiv preprint arXiv:1906.07852 (2019).
  3. Deanonymizing Tor hidden service users through Bitcoin transactions analysis. Computers & Security 89 (2020), 101684.
  4. Evaluating user privacy in bitcoin. In International conference on financial cryptography and data security. Springer, 34–51.
  5. LGBM: a machine learning approach for Ethereum fraud detection. International Journal of Information Technology (2022), 1–11.
  6. Data mining for detecting bitcoin ponzi schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 75–84.
  7. Danton Bryans. 2014. Bitcoin and money laundering: mining for an effective solution. Ind. LJ 89 (2014), 441.
  8. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1–43.
  9. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology (TOIT) 21, 1 (2020), 1–16.
  10. Understanding ethereum via graph analysis. ACM Transactions on Internet Technology (TOIT) 20, 2 (2020), 1–32.
  11. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 world wide web conference. 1409–1418.
  12. Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7 (2019), 37575–37586.
  13. On the Properties of Neural Machine Translation: Encoder–Decoder Approaches. In Proceedings of SSST-8, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation. 103–111.
  14. Lena Y Connolly and David S Wall. 2019. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Computers & Security 87 (2019), 101568.
  15. On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Computers & Security 79 (2018), 162–189.
  16. Yaya Fanusie and Tom Robinson. 2018. Bitcoin laundering: an analysis of illicit flows into digital currency services. Center on Sanctions and Illicit Finance memorandum, January (2018).
  17. Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657 (2015).
  18. Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? The Review of Financial Studies 32, 5 (2019), 1798–1853.
  19. An analysis of the Bitcoin users graph: inferring unusual behaviours. In International Workshop on Complex Networks and their Applications. Springer, 749–760.
  20. Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In Proceedings of the 51st Hawaii international conference on system sciences.
  21. Kristen Jaskie and Andreas Spanias. 2019. Positive and unlabeled learning algorithms and applications: A survey. In 2019 10th IISA. IEEE, 1–8.
  22. Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013).
  23. Robin Klusman and Tim Dijkhuizen. 2018. Deanonymisation in ethereum using existing methods for bitcoin.
  24. A survey on blockchain anomaly detection using data mining techniques. In International Conference on Blockchain and Trustworthy Systems. Springer, 491–504.
  25. TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection. In Proceedings of the ACM Web Conference 2022. 661–669.
  26. Identifying illicit addresses in bitcoin network. In International Conference on Blockchain and Trustworthy Systems. Springer, 99–111.
  27. Bitcoin exchange addresses identification and its application in online drug trading regulation. In 23rd Pacific Asia Conference on Information Systems: Secure ICT Platform for the 4th Industrial Revolution, PACIS 2019.
  28. Modeling and understanding ethereum transaction records via a complex network approach. IEEE Transactions on Circuits and Systems II: Express Briefs 67, 11 (2020), 2737–2741.
  29. T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. Frontiers in Physics 8 (2020), 204.
  30. Building text classifiers using positive and unlabeled examples. In Third IEEE International Conference on Data Mining. IEEE, 179–186.
  31. Intention-aware heterogeneous graph attention networks for fraud transactions detection. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. 3280–3288.
  32. Fraud transactions detection via behavior tree with local intention calibration. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 3035–3043.
  33. Pick and Choose: A GNN-Based Imbalanced Learning Approach for Fraud Detection. In Proceedings of the Web Conference 2021.
  34. Visualizing dynamic bitcoin transaction patterns. Big data 4, 2 (2016), 109–119.
  35. Towards open data blockchain analytics: a Bitcoin perspective. Royal Society open science 5, 8 (2018), 180298.
  36. John V Monaco. 2015. Identifying bitcoin users by transaction behavior. In Biometric and surveillance technology for human and activity identification XII, Vol. 9457. SPIE, 25–39.
  37. An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit. IEEE, 1–14.
  38. Towards risk scoring of Bitcoin transactions. In International conference on financial cryptography and data security. Springer, 16–32.
  39. Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees. In Proceedings of the 2020 10th international conference on information communication and management. 25–30.
  40. Ransomware payments in the bitcoin ecosystem. Journal of Cybersecurity 5, 1 (2019), tyz003.
  41. Thai Pham and Steven Lee. 2016. Anomaly detection in the bitcoin system-a network perspective. arXiv preprint arXiv:1611.03942 (2016).
  42. Discovering bitcoin mixing using anomaly detection. In Iberoamerican Congress on Pattern Recognition. Springer, 534–541.
  43. Exchange pattern mining in the bitcoin transaction directed hypergraph. In International conference on financial cryptography and data security. Springer, 248–263.
  44. Fergal Reid and Martin Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks. Springer, 197–223.
  45. Identifying bitcoin users using deep neural network. In International Conference on Algorithms and Architectures for Parallel Processing. Springer, 178–192.
  46. Knowledge augmented transformer for adversarial multidomain multiclassification multimodal fake news detection. Neurocomputing 462 (2021), 88–100.
  47. CED: Credible early detection of social media rumors. IEEE Transactions on Knowledge and Data Engineering (2019).
  48. When Will It Happen? Relationship Prediction in Heterogeneous Information Networks. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining (WSDM ’12). 663–672. https://doi.org/10.1145/2124295.2124373
  49. Identifying Illicit Accounts in Large Scale E-payment Networks–A Graph Representation Learning Approach. arXiv preprint arXiv:1906.05546 (2019).
  50. Marie Vasek and Tyler Moore. 2015. There’s no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In International conference on financial cryptography and data security. Springer, 44–61.
  51. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019).
  52. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2021).
  53. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2020).
  54. hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE transactions on cybernetics 50, 4 (2018), 1595–1606.
  55. Haohua Sun Yin and Ravi Vatrapu. 2017. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 3690–3699.
  56. Wikipedia vandal early detection: from user behavior to user embedding. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 832–846.
  57. Safe: A neural survival analysis model for fraud early detection. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33. 1278–1285.
  58. Bitcoin and cybersecurity: Temporal dissection of blockchain data to unveil changes in entity behavioral patterns. Applied Sciences 9, 23 (2019), 5003.
Citations (1)

Summary

We haven't generated a summary for this paper yet.