Time Series Analysis for Bitcoin Transactions: The Case of Pirate@40's HYIP Scheme

Due to the increased popularity of Bitcoin, many researchers have analyzed how Bitcoin is being used based on the transaction history. However, the existing works analyze the transaction history in a "static" manner and none of them analyzes transaction history "dynamically", i.e. without taking into account the "time variation of how Bitcoin is transferred". The time analysis is in great demand for many practical cases, such as digital forensics tool that infers what was going on behind the scene of a fraudulent scam, and real-time inference of marketplace sales. In this paper, we propose a novel time series analysis for analyzing the history of Bitcoin transactions. In fact the main goal of our research is to detect changing points, namely anomaly detection, against a given (Bitcoin) address's transaction history. To show the effectiveness of the proposed approach, it is tested against the transaction history of Pirate@40's HYIP (High Yielding Investment Program) scheme, which raised 700,000 BTC from his investors and was charged by the Security and Exchange Commission (SEC) in 2013. It is shown that the proposed approach can successfully detect several remarkable points of Pirate@40's HYIP scheme, such as when its program's name was changed to Bitcoin Saving & Trust and when its investment rule was changed.

[1]  Nagiza F. Samatova,et al.  Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph , 2017, Financial Cryptography Workshops.

[2]  P. Takis Mathiopoulos,et al.  Multi-Class Bitcoin-Enabled Service Identification Based on Transaction History Summarization , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[3]  Benjamin Fabian,et al.  Analyzing the Bitcoin Network: The First Four Years , 2016, Future Internet.

[4]  Tyler Moore,et al.  There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.

[5]  Ravikiran Vatrapu,et al.  A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[8]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[9]  Hongliang Fei,et al.  Anomaly localization for network data streams with graph joint sparse PCA , 2011, KDD.

[10]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[11]  P. Takis Mathiopoulos,et al.  Identification of High Yielding Investment Programs in Bitcoin via Transactions Pattern Analysis , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Naoki Abe,et al.  Proximity-Based Anomaly Detection Using Sparse Structure Learning , 2009, SDM.

[13]  Tyler Moore,et al.  The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs , 2012, Financial Cryptography.

[14]  Nicolas Christin,et al.  Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.