Generation and Classification of Illicit Bitcoin Transactions

被引:0
作者
de Juan Fidalgo, Pablo [1 ]
Camara, Carmen [1 ]
Peris-Lopez, Pedro [1 ]
机构
[1] Univ Carlos III Madrid, Madrid, Spain
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022) | 2023年 / 594卷
关键词
Bitcoin; Anti-money laundering; Data imbalance; Deep learning; Generative adversarial networks; Long short-term memory networks;
D O I
10.1007/978-3-031-21333-5_108
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Financial fraud is an everyday problem that banking institutions have to face. With the disruption of Bitcoin as a new model which relies on decentralisation and anonymity, attackers have taken advantage of this monetary system. It allows them to obtain funds from illegal activities such as ransomware payments and hide them. At the same time, Law Enforcement Agencies use open-source data to apply network forensics to Blockchain data. The analysis is usually performed by using artificial intelligence. Unfortunately, the current situation shows a scarcity of high-quality data sets to train the detection algorithms. This work tries to overcome this barrier with significant contributions. With nearly 25,000 illicit transactions, we have increased the Elliptic Data Set -the most extensive labelled transaction data publicly available in any cryptocurrency. The former data set only contained 4,545 illicit transactions, resulting in a class imbalance of 9.8:90.2 illicit/licit ratio. Our work has changed that to a 41.2:58.8 illicit/licit ratio. Besides, to show that class imbalance datasets can also be beaten with artificial work, we have studied the use of generative adversarial networks (GAN) for creating synthetic samples. Finally, the last part of this work was dedicated to applying deep learning and, more particularly, long short-term memory networks (LSTM) for the binary classification problem. We show ideal results that can help change the current state-of-the-art trend, mainly focused on machine learning algorithms.
引用
收藏
页码:1086 / 1097
页数:12
相关论文
共 26 条
[1]  
[Anonymous], BLOCKCH AN AMP CRYPT
[2]  
[Anonymous], 2019, DEANONYMIZED 99 5 PC
[3]  
[Anonymous], ESPL HTTP API
[4]  
[Anonymous], IMPLEMENTATION KERAS
[5]   Data mining for detecting Bitcoin Ponzi schemes [J].
Bartoletti, Massimo ;
Pes, Barbara ;
Serusi, Sergio .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :75-84
[6]   Deanonymization and linkability of cryptocurrency transactions based on network analysis [J].
Biryukov, Alex ;
Tikhomirov, Sergei .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :172-184
[7]  
Clemente F., 2020, GENERATE SYNTHETIC T
[8]   On the economic significance of ransomware campaigns: A Bitcoin transactions perspective [J].
Conti, Mauro ;
Gangwal, Ankit ;
Ruj, Sushmita .
COMPUTERS & SECURITY, 2018, 79 :162-189
[9]  
Dutta G., 2021, FIXING IMBALANCE DAT
[10]  
Feldman Elena V., 2021, Recent Trends in Analysis of Images, Social Networks and Texts: 9th International Conference, AIST 2020. Communications in Computer and Information Science (1357), P205, DOI 10.1007/978-3-030-71214-3_17