A New Bitcoin Address Association Method Using a Two-Level Learner Model

Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitcoin address association scheme which makes address tracing possible in Bitcoin systems. The proposed scheme can be used to warn relevant institutions to study more secure encryption algorithms to protect users’ privacy. Specifically, the important features of a Bitcoin address are extracted. After that, to reduce the computational complexity, we transform the clustering problem of addresses into a binary classification problem in which we integrate the features of two Bitcoin addresses. A novel two-level learner model is then built to analyze if the two Bitcoin addresses are belonging to the same user. Finally we cluster the addresses belonging to the same user accordingly. Extensive experimental results show that the proposed method outperforms the other address association schemes, which use deep learning models or heuristics, and can achieve an increase by 6%–20% in precision and by 10% improvement in recall.

[1]  Agus Widodo,et al.  Revenue Prediction Using Artificial Neural Network , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[2]  Geoffrey E. Hinton,et al.  Rectified Linear Units Improve Restricted Boltzmann Machines , 2010, ICML.

[3]  Souradyuti Paul,et al.  A New Approach to Deanonymization of Unreachable Bitcoin Nodes , 2018, IACR Cryptol. ePrint Arch..

[4]  Günter Müller,et al.  Economic Analysis of Cryptocurrency Backed Money Laundering , 2015, ECIS.

[5]  Adam Doupé,et al.  Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).

[6]  Tie-Yan Liu,et al.  LightGBM: A Highly Efficient Gradient Boosting Decision Tree , 2017, NIPS.

[7]  Zibin Zheng,et al.  Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[8]  Meng Yang,et al.  Large-Margin Softmax Loss for Convolutional Neural Networks , 2016, ICML.

[9]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[10]  Alex Biryukov,et al.  Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.

[11]  Stefan Savage,et al.  A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.

[12]  Massimo Bartoletti,et al.  Data Mining for Detecting Bitcoin Ponzi Schemes , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[13]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[14]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[15]  Jonas David Nick,et al.  Data-Driven De-Anonymization in Bitcoin , 2015 .

[16]  Wei Shao,et al.  Identifying Bitcoin Users Using Deep Neural Network , 2018, ICA3PP.

[17]  Adi Shamir,et al.  How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? , 2014, Financial Cryptography Workshops.

[18]  Jacob Benesty,et al.  Pearson Correlation Coefficient , 2009 .

[19]  H. B. Barlow,et al.  Unsupervised Learning , 1989, Neural Computation.

[20]  Jianping Yu,et al.  Research on Anonymization and De-anonymization in the Bitcoin System , 2015, ArXiv.

[21]  Maxim Panov,et al.  Automatic Bitcoin Address Clustering , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[22]  J. Friedman Greedy function approximation: A gradient boosting machine. , 2001 .

[23]  Sylvain Arlot,et al.  A survey of cross-validation procedures for model selection , 2009, 0907.4728.

[24]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[25]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.