Machine Learning-Based Ransomware Classification of Bitcoin Transactions

被引:11
作者
Alsaif, Suleiman Ali [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Deanship Preparatory Year & Supporting Studies, Comp Dept, Dammam 31441, Saudi Arabia
关键词
ANONYMITY; SYSTEM;
D O I
10.1155/2023/6274260
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ransomware attacks are one of the most dangerous related crimes in the coin market. To increase the challenge of fighting the attack, early detection of ransomware seems necessary. In this article, we propose a high-performance Bitcoin transaction predictive system that investigates Bitcoin payment transactions to learn data patterns that can recognize and classify ransomware payments for heterogeneous bitcoin networks into malicious or benign transactions. The proposed approach makes use of three supervised machine learning methods to learn the distinctive patterns in Bitcoin payment transactions, namely, logistic regression (LR), random forest (RF), and Extreme Gradient Boosting (XGBoost). We evaluate these ML-based predictive models on the BitcoinHeist ransomware dataset in terms of classification accuracy and other evaluation measures such as confusion matrix, recall, and F1-score. It turned out that the experimental results recorded by the XGBoost model achieved an accuracy of 99.08%. As a result, the resulting model accuracy is higher than many recent state-of-the-art models developed to detect ransomware payments in Bitcoin transactions.
引用
收藏
页数:10
相关论文
共 35 条
[21]  
Liao K, 2016, PROCEEDINGS OF THE 2016 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P1
[22]   Dynamic Network Anomaly Detection System by Using Deep Learning Techniques [J].
Lin, Peng ;
Ye, Kejiang ;
Xu, Cheng-Zhong .
CLOUD COMPUTING - CLOUD 2019, 2019, 11513 :161-176
[23]  
Ludwig S. A., 2017, P IEEE S SERIES COMP, P1
[24]   A Fistful of Bitcoins: Characterizing Payments among Men with No Names [J].
Meiklejohn, Sarah ;
Pomarole, Marjori ;
Jordan, Grant ;
Levchenko, Kirill ;
Mccoy, Damon ;
Voelker, Geoffrey M. ;
Savage, Stefan .
COMMUNICATIONS OF THE ACM, 2016, 59 (04) :86-93
[25]  
Möser M, 2017, J CYBERSECURITY, V3, P127, DOI 10.1093/cybsec/tyx007
[26]   Structure and Anonymity of the Bitcoin Transaction Graph [J].
Ober, Micha ;
Katzenbeisser, Stefan ;
Hamacher, Kay .
FUTURE INTERNET, 2013, 5 (02) :237-250
[27]   Ransomware payments in the Bitcoin ecosystem [J].
Paquet-Clouston, Masarah ;
Haslhofer, Bernhard ;
Dupont, Benoit .
JOURNAL OF CYBERSECURITY, 2019, 5 (01) :1-11
[28]  
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[29]   Blockchain Technology: What Is It Good For? [J].
Ruoti, Scott ;
Kaiser, Ben ;
Yerukhimovich, Arkady ;
Clark, Jeremy ;
Cunningham, Robert .
COMMUNICATIONS OF THE ACM, 2020, 63 (01) :46-53
[30]   Aided Selection of Sampling Methods for Imbalanced Data Classification [J].
Sahni, Deep ;
Pappu, Satya Jayadev ;
Bhatt, Nirav .
CODS-COMAD 2021: PROCEEDINGS OF THE 3RD ACM INDIA JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE & MANAGEMENT OF DATA (8TH ACM IKDD CODS & 26TH COMAD), 2021, :198-202