The problem of anomaly detection has been studied for a long time, and many Network Analysis techniques have been proposed as solutions. Although some results appear to be quite promising, no method is clearly to be superior to the rest. In this paper, we particularly consider anomaly detection in the Bitcoin transaction network. Our goal is to detect which users and transactions are the most suspicious; in this case, anomalous behavior is a proxy for suspicious behavior. To this end, we use the laws of power degree and densification and local outlier factor (LOF) method (which is proceeded by k-means clustering method) on two graphs generated by the Bitcoin transaction network: one graph has users as nodes, and the other has transactions as nodes.
We remark that the methods used here can be applied to any type of setting with an inherent graph structure, including, but not limited to, computer networks, telecommunications networks, auction networks, security networks, social networks, Web networks, or any financial networks. We use the Bitcoin transaction network in this paper due to the availability, size, and attractiveness of the data set.
[1]
Steven Lee,et al.
Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods
,
2016,
ArXiv.
[2]
Hans-Peter Kriegel,et al.
LOF: identifying density-based local outliers
,
2000,
SIGMOD '00.
[3]
Christos Faloutsos,et al.
Graph evolution: Densification and shrinking diameters
,
2006,
TKDD.
[4]
Thai Pham,et al.
Low Latency Anomaly Detection and Bayesian Network Prediction of Anomaly Likelihood
,
2016,
ArXiv.
[5]
Hui Xiong,et al.
K-means clustering versus validation measures: a data distribution perspective
,
2006,
KDD '06.
[6]
S. P. Lloyd,et al.
Least squares quantization in PCM
,
1982,
IEEE Trans. Inf. Theory.