Supervised learning model for identifying illegal activities in Bitcoin

Since its inception in 2009, Bitcoin is mired in controversies for providing a haven for illegal activities. Several types of illicit users hide behind the blanket of anonymity. Uncovering these entities is key for forensic investigations. Current methods utilize machine learning for identifying these illicit entities. However, the existing approaches only focus on a limited category of illicit users. The current paper proposes to address the issue by implementing an ensemble of decision trees for supervised learning. More parameters allow the ensemble model to learn discriminating features that can categorize multiple groups of illicit users from licit users. To evaluate the model, a dataset of 1216 real-life entities on Bitcoin was extracted from the Blockchain. Nine Features were engineered to train the model for segregating 16 different licit-illicit categories of users. The proposed model provided a reliable tool for forensic study. Empirical evaluation of the proposed model vis-a-vis three existing benchmark models was performed to highlight its efficacy. Experiments showed that the specificity and sensitivity of the proposed model were comparable to other models. Due to higher parameters of the ensemble tree model, the classification accuracy was 0.91, with 95% CI - 0.8727, 0.9477. This was better than SVM and Logistic Regression, the two popular models in the literature and comparable to the Random Forest and XGBOOST model. CPU and RAM utilization were also monitored to demonstrate the usefulness of the proposed work for real-world deployment. RAM utilization for the proposed model was higher by 30-45% compared to the other three models. Hence, the proposed model is resource-intensive as it has higher parameters than the other three models. Higher parameters also result in higher accuracy of predictions.

[1]  Dacheng Tao,et al.  Bitcoin Mixing Detection Using Deep Autoencoder , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[2]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[3]  Laura Ricci,et al.  Data-driven analysis of Bitcoin properties: exploiting the users graph , 2018, International Journal of Data Science and Analytics.

[4]  Tomoaki Ohtsuki,et al.  Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[5]  Ravikiran Vatrapu,et al.  A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[6]  James Won-Ki Hong,et al.  Toward Detecting Illegal Transactions on Bitcoin Using Machine-Learning Methods , 2019, BlockSys.

[7]  Adam B. Turner,et al.  Bitcoin transactions: a digital discovery of illicit activity on the blockchain , 2017 .

[8]  Daniel Dajun Zeng,et al.  Bitcoin Exchange Addresses Identification and Its Application in Online Drug Trading Regulation , 2019, PACIS.

[9]  Stefano Bistarelli,et al.  A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report , 2018, Euro-Par Workshops.

[10]  Jie Chen,et al.  Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics , 2019, ArXiv.

[11]  Gina Gallegos García,et al.  A Method for Blockchain Transactions Analysis , 2019 .

[12]  Bernhard Haslhofer,et al.  Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem , 2019, AFT.

[13]  Laura Ricci,et al.  Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[14]  Jeremy Clark,et al.  Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.

[15]  Frédérique E. Oggier,et al.  EGRET: Extortion Graph Exploration Techniques in the Bitcoin Network , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[16]  Xinyu Gu,et al.  An Abnormal Transaction Detection Mechanim on Bitcoin , 2019, 2019 International Conference on Networking and Network Applications (NaNA).

[17]  Angela Irwin,et al.  Illicit Bitcoin transactions: challenges in getting to the who, what, when and where , 2018, Journal of Money Laundering Control.

[18]  Tomoaki Ohtsuki,et al.  A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification , 2019, IEEE Access.

[19]  Tyler Moore,et al.  There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams , 2015, Financial Cryptography.

[20]  Mauro Conti,et al.  A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.

[21]  Yan Luo,et al.  Do Bitcoin Users Really Care About Anonymity? An Analysis of the Bitcoin Transaction Graph , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[22]  Steven Lee,et al.  Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods , 2016, ArXiv.

[23]  Mauro Conti,et al.  Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis , 2019, SAC.

[24]  Yan Wu,et al.  A Bitcoin Transaction Network Analytic Method for Future Blockchain Forensic Investigation , 2020, IEEE Transactions on Network Science and Engineering.

[25]  Sehyun Park,et al.  Nodes in the Bitcoin Network: Comparative Measurement Study and Survey , 2019, IEEE Access.

[26]  Laura Wynter,et al.  Characterizing Entities in the Bitcoin Blockchain , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[27]  Maxim Panov,et al.  Automatic Bitcoin Address Clustering , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[28]  Murat Kantarcioglu,et al.  BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain , 2020, IJCAI.

[29]  Vukosi N. Marivate,et al.  Unsupervised learning for robust Bitcoin fraud detection , 2016, 2016 Information Security for South Africa (ISSA).

[30]  Andrea Pinna,et al.  A Petri Nets Model for Blockchain Analysis , 2017, Comput. J..

[31]  Jordi Herrera-Joancomartí,et al.  Research and Challenges on Bitcoin Anonymity , 2014, DPM/SETOP/QASA.

[32]  Kensuke Fukuda,et al.  Characterizing and Detecting Money Laundering Activities on the Bitcoin Network , 2019, ArXiv.

[33]  Muttukrishnan Rajarajan,et al.  Detection of Bitcoin-Based Botnets Using a One-Class Classifier , 2018, WISTP.

[34]  Vukosi N. Marivate,et al.  A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[35]  Andrea Marino,et al.  The bow tie structure of the Bitcoin users graph , 2019, Appl. Netw. Sci..

[36]  Tālis J. Putniņš,et al.  Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed through Cryptocurrencies? , 2019, The Review of Financial Studies.

[37]  Ravikiran Vatrapu,et al.  Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning , 2018, HICSS.

[38]  Raghava Rao Mukkamala,et al.  Regulating Cryptocurrencies: A Supervised Machine Learning Approach to De-Anonymizing the Bitcoin Blockchain , 2019, J. Manag. Inf. Syst..

[39]  Qutaibah M. Malluhi,et al.  Anonymity and Privacy in Bitcoin Escrow Trades , 2019, WPES@CCS.

[40]  Sadia Afroz,et al.  Backpage and Bitcoin: Uncovering Human Traffickers , 2017, KDD.

[41]  Francesco Zola,et al.  Cascading Machine Learning to Attack Bitcoin Anonymity , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[42]  Yulei Wu,et al.  A New Bitcoin Address Association Method Using a Two-Level Learner Model , 2019, ICA3PP.

[43]  Wei Shao,et al.  Identifying Bitcoin Users Using Deep Neural Network , 2018, ICA3PP.

[44]  T. Moore,et al.  Bitcoin: Economics, Technology, and Governance , 2014 .

[45]  Laura Ricci,et al.  The Graph Structure of Bitcoin , 2018, COMPLEX NETWORKS.

[46]  John Bohannon,et al.  The Bitcoin busts. , 2016, Science.

[47]  Jordi Zayuelas Muñoz Detection of Bitcoin miners from network measurements , 2019 .

[48]  Andreas Bogner,et al.  Seeing is understanding: anomaly detection in blockchains with visualized features , 2017, UbiComp/ISWC Adjunct.

[49]  Yan Wu,et al.  Identifying suspicious addresses in Bitcoin thefts , 2019, Digit. Investig..

[50]  Murat Kantarcioglu,et al.  BitcoinHeist: Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain , 2019, ArXiv.

[51]  Nasir Ghani,et al.  Bitcoin Concepts, Threats, and Machine-Learning Security Solutions , 2018, IEEE Access.

[52]  Massimo Bartoletti,et al.  Data Mining for Detecting Bitcoin Ponzi Schemes , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[53]  Iyad Rahwan,et al.  The Anti-Social System Properties: Bitcoin Network Data Analysis , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.