Multi-class Bitcoin mixing service identification based on graph classification

Xiaoyan Hu , Meiqun Gui , Guang Cheng , Ruidong Li , Hua Wu

›› 2024, Vol. 10 ›› Issue (6) : 1881 -1893.

PDF
›› 2024, Vol. 10 ›› Issue (6) :1881 -1893. DOI: 10.1016/j.dcan.2024.08.010
Research article
research-article

Multi-class Bitcoin mixing service identification based on graph classification

Author information +
History +
PDF

Abstract

Due to its anonymity and decentralization, Bitcoin has long been a haven for various illegal activities. Cyber-criminals generally legalize illicit funds by Bitcoin mixing services. Therefore, it is critical to investigate the mixing services in cryptocurrency anti-money laundering. Existing studies treat different mixing services as a class of suspicious Bitcoin entities. Furthermore, they are limited by relying on expert experience or needing to deal with large-scale networks. So far, multi-class mixing service identification has not been explored yet. It is challenging since mixing services share a similar procedure, presenting no sharp distinctions. However, mixing service identification facilitates the healthy development of Bitcoin, supports financial forensics for cryptocurrency regulation and legislation, and provides technical means for fine-grained blockchain supervision. This paper aims to achieve multi-class Bitcoin Mixing Service Identification with a Graph Classification (BMSI-GC) model. First, BMSI-GC constructs 2-hop ego networks (2-egonets) of mixing services based on their historical transactions. Second, it applies graph2vec, a graph classification model mainly used to calculate the similarity between graphs, to automatically extract address features from the constructed 2-egonets. Finally, it trains a multilayer perceptron classifier to perform classification based on the extracted features. BMSI-GC is flexible without handling the full-size network and handcrafting address features. Moreover, the differences in transaction patterns of mixing services reflected in the 2-egonets provide adequate information for identification. Our experimental study demonstrates that BMSI-GC performs excellently in multi-class Bitcoin mixing service identification, achieving an average identification F1-score of 95.08%.

Keywords

Bitcoin / Anti-money laundering / Mixing service / Ego network / Graph classification

Cite this article

Download citation ▾
Xiaoyan Hu, Meiqun Gui, Guang Cheng, Ruidong Li, Hua Wu. Multi-class Bitcoin mixing service identification based on graph classification. , 2024, 10(6): 1881-1893 DOI:10.1016/j.dcan.2024.08.010

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

S. Nakamoto,Bitcoin: a peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf, 2008. (Accessed 10 May 2022).

[2]

H. Raza, M.R. Raza, A study of blockchain technology, bitcoin and other cryptocur-rencies as means of money laundering, frauds and scams, Glob Media Soc. Sci. Res. J. 2(1) (2021) 73-84.

[3]

K. Oosthoek, C. Doerr, Cyber security threats to bitcoin exchanges: adversary ex-ploitation and laundering techniques, IEEE Trans. Netw. Serv. Manag. 18 (2) (2021) 1616-1628.

[4]

Chainalysis,2023 crypto crime trends: Illicit cryptocurrency volumes reach all-time highs amid surge in sanctions designations and hacking, 2023.

[5]

B. Zheng, L. Zhu, M. Shen, X. Du, M. Guizani, Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering, Sci. China Inf. Sci. 63 (3) (2020) 1-15.

[6]

Y. Fanusie, T. Robinson,Bitcoin laundering: an analysis of illicit flows into digital currency services, https://info.elliptic.co/whitepaper-fdd-bitcoin-laundering, 2018.(Accessed 12 May 2022).

[7]

L. Wu, Y. Hu, Y. Zhou, H. Wang, X. Luo, Z. Wang, F. Zhang, K. Ren,Towards under-standing and demystifying bitcoin mixing services, in: The Web Conference 2021, ACM, 2021, pp. 33-44.

[8]

M. Möser, R. Böhme, D. Breuker, An inquiry into money laundering tools in the bit-coin ecosystem, in: 2013 APWG eCrime Researchers Summit, IEEE, 2013, pp. 1-14.

[9]

T. De Balthasar, J. Hernandez-Castro, An analysis of bitcoin laundry services, in: Nordic Conference on Secure IT Systems, Springer, 2017, pp. 297-312.

[10]

J. Crawford, Y. Guan, Knowing your bitcoin customer: money laundering in the bitcoin economy, in: 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE), IEEE, 2020, pp. 38-45.

[11]

M.A. Prado-Romero, C. Doerr, A. Gago-Alonso, Discovering bitcoin mixing using anomaly detection, in: Iberoamerican Congress on Pattern Recognition, Springer, 2017, pp. 534-541.

[12]

K. Toyoda, T. Ohtsuki, P.T. Mathiopoulos, Multi-class bitcoin-enabled service iden-tification based on transaction history summarization, in: 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Com-munications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, 2018, pp. 1153-1160.

[13]

P. Nerurkar, S. Bhirud, D. Patel, R. Ludinard, Y. Busnel, S. Kumari, Supervised learn-ing model for identifying illegal activities in bitcoin, Appl. Intell. 51 (6) (2021) 3824-3843.

[14]

Y.-J. Lin, P.-W. Wu, C.-H. Hsu, I.-P. Tu, S.-w. Liao, An evaluation of bitcoin address classification based on transaction history summarization, in: 2019 IEEE Interna-tional Conference on Blockchain and Cryptocurrency, IEEE, 2019, pp. 302-310.

[15]

M. Weber, G. Domeniconi, J. Chen, D.K.I. Weidele, C. Bellei, T. Robinson, C.E. Leis-erson,Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics, in: KDD 2019 Workshop on Anomaly Detection in Finance, ACM, 2019, pp. 1-7.

[16]

J. Wu, J. Liu, W. Chen, H. Huang, Z. Zheng, Y. Zhang, Detecting mixing services via mining bitcoin transaction network with hybrid motifs, IEEE Trans. Syst. Man Cybern. Syst. 52 (4) (2022) 2237-2249.

[17]

X. Sun, T. Yang, B. Hu, Lstm-tc: bitcoin coin mixing detection method with a high recall, Appl. Intell. 52 (1) (2022) 780-793.

[18]

A. Narayanan, M. Chandramohan, R. Venkatesan, L. Chen, Y. Liu, S. Jaiswal, graph2vec: learning distributed representations of graphs, in: 13th International Workshop on Mining and Learning with Graphs, ACM, 2017, pp. 1-8.

[19]

L. Akoglu, M. McGlohon, C. Faloutsos, Oddball: spotting anomalies in weighted graphs, Lect. Notes Comput. Sci. 6119 (2010) 410-421.

[20]

A.H.H. Kabla, M. Anbar, S. Manickam, S. Karuppayah, Eth-psd: a machine learning-based phishing scam detection approach in Ethereum, IEEE Access 10 (2022) 118043-118057.

[21]

X. He, T. Yang, L. Chen, Y. Chen, Ctrf: Ethereum-based Ponzi contract identification, Secur. Commun. Netw. 2022 (2022) 1-10.

[22]

S. Dalal, Z. Wang, S. Sabharwal, Identifying ransomware actors in the bitcoin net-work, CoRR, arXiv : 2108.13807.

[23]

Q. Yuan, B. Huang, J. Zhang, J. Wu, H. Zhang, X. Zhang, Detecting phishing scams on Ethereum based on transaction records, in: 2020 IEEE International Symposium on Circuits and Systems, 2020, pp. 1-5.

[24]

J. Wu, Q. Yuan, D. Lin, W. You, W. Chen, C. Chen, Z. Zheng, Who are the phishers?Phishing scam detection on Ethereum via network embedding, IEEE Trans. Syst. Man Cybern. Syst. 52 (2) (2022) 1156-1166.

[25]

L. Chen, J. Peng, Y. Liu, J. Li, F. Xie, Z. Zheng, Phishing scams detection in Ethereum transaction network, ACM Trans. Internet Technol. 21 (1) (2020) 1-16.

[26]

L. Pan, Z. Liu,Enhanced temporal graph embedding for identifying fraudulent trans-actions on transaction networks, in:18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2021, pp. 71-76.

[27]

Y. Xia, J. Liu, J. Wu, Phishing detection on Ethereum via attributed ego-graph em-bedding, IEEE Trans. Circuits Syst. II, Express Briefs 69 (5) (2022) 2538-2542.

[28]

J. Zhou, C. Hu, J. Chi, J. Wu, M. Shen, Q. Xuan, Behavior-aware account de-anonymization on Ethereum interaction graph, IEEE Trans. Inf. Forensics Secur. 17 (2022) 3433-3448.

[29]

F. Reid, M. Harrigan, An analysis of anonymity in the bitcoin system, in: Security and Privacy in Social Networks, 2013, pp. 197-223.

[30]

Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, S.Y. Philip, A comprehensive survey on graph neural networks, IEEE Trans. Neural Netw. Learn. Syst. 32 (1) (2020) 4-24.

[31]

B. Perozzi, R. Al-Rfou, S. Skiena, Deepwalk: online learning of social representations, in: 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2014, pp. 701-710.

[32]

A. Grover, J. Leskovec, node2vec: scalable feature learning for networks, in: 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2016, pp. 855-864.

[33]

T.N. Kipf, M. Welling, Semi-supervised classification with graph convolutional net-works, in: Proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG), ACM, 2017, pp. 1-14.

[34]

S. Ferretti, B. Battaglia,Simulation of bitcoin transactions to identify money launder-ing activities, Ph.D. thesis, http://amslaurea.unibo.it/24249/, 2021. (Accessed 10 May 2022).

[35]

T. Mikolov, K. Chen, G. Corrado, J. Dean,Efficient estimation of word represen-tations in vector space, in:International Conference on Learning Representations, 2013, pp. 1-12.

[36]

Q.V. Le, T. Mikolov,Distributed representations of sentences and documents, in:International Conference on Machine Learning, 2014, pp. 1188-1196.

[37]

M. Liu, H. Chen, J. Yan, Detecting roles of money laundering in bitcoin mixing trans-actions: a goal modeling and mining framework, Front. Phys. 9 (2021) 1-8.

[38]

F. Errica, M. Podda, D. Bacciu, A. Micheli,A fair comparison of graph neural net-works for graph classification, in:International Conference on Learning Representa-tions, 2020, pp. 1-16.

[39]

N.V. Chawla, K.W. Bowyer, L.O. Hall, W.P. Kegelmeyer, SMOTE: synthetic minority over-sampling technique, J. Artif. Intell. Res. 16 (2002) 321-357.

[40]

Z. Yin, Y. Shen, On the dimensionality of word embedding, in: 32nd International Conference on Neural Information Processing Systems, Curran Associates, 2018, pp. 895-906.

[41]

M. Sokolova, G. Lapalme, A systematic analysis of performance measures for classi-fication tasks, Inf. Process. Manag. 45 (4) (2009) 427-437.

[42]

J.A. Hanley, B.J. McNeil, The meaning and use of the area under a receiver operating characteristic (ROC) curve, Radiology 143 (1) (1982) 29-36.

[43]

Y. Li, G. Yang, W. Susilo, Y. Yu, M.H. Au, D. Liu, Traceable monero: anonymous cryp-tocurrency with enhanced accountability, IEEE Trans. Dependable Secure Comput. 18 (2) (2021) 679-691.

[44]

Y. Li, W. Susilo, G. Yang, Y. Yu, X. Du, D. Liu, N. Guizani, Toward privacy and regulation in blockchain-based cryptocurrencies, IEEE Netw. 33 (5) (2019) 111-117.

[45]

S.J. Pan, Q. Yang, A survey on transfer learning, IEEE Trans. Knowl. Data Eng. 22 (10) (2010) 1345-1359.

AI Summary AI Mindmap
PDF

88

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/