Skip to main content

2020 | OriginalPaper | Buchkapitel

A New Bitcoin Address Association Method Using a Two-Level Learner Model

verfasst von : Tengyu Liu, Jingguo Ge, Yulei Wu, Bowei Dai, Liangxiong Li, Zhongjiang Yao, Jifei Wen, Hongbin Shi

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Users in the Bitcoin system adopt a pseudonym-Bitcoin address as the transaction account, making Bitcoin address correlation analysis a challenging task. Under this circumstance, this paper provides a new Bitcoin address association scheme which makes address tracing possible in Bitcoin systems. The proposed scheme can be used to warn relevant institutions to study more secure encryption algorithms to protect users’ privacy. Specifically, the important features of a Bitcoin address are extracted. After that, to reduce the computational complexity, we transform the clustering problem of addresses into a binary classification problem in which we integrate the features of two Bitcoin addresses. A novel two-level learner model is then built to analyze if the two Bitcoin addresses are belonging to the same user. Finally we cluster the addresses belonging to the same user accordingly. Extensive experimental results show that the proposed method outperforms the other address association schemes, which use deep learning models or heuristics, and can achieve an increase by 6%–20% in precision and by 10% improvement in recall.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat ShenTu, Q.C., Yu, J.P.: Research on anonymization and de-anonymization in the bitcoin system. arXiv preprint arXiv:1510.07782 (2015) ShenTu, Q.C., Yu, J.P.: Research on anonymization and de-anonymization in the bitcoin system. arXiv preprint arXiv:​1510.​07782 (2015)
2.
Zurück zum Zitat Brenig, C., Accorsi, R., Müller, G.: Economic analysis of cryptocurrency backed money laundering. In: ECIS (2015) Brenig, C., Accorsi, R., Müller, G.: Economic analysis of cryptocurrency backed money laundering. In: ECIS (2015)
3.
Zurück zum Zitat Fanusie, Y., Robinson, T.: Bitcoin laundering: an analysis of illicit flows into digital currency services. Center on Sanctions & Illicit Finance memorandum, January 2018 Fanusie, Y., Robinson, T.: Bitcoin laundering: an analysis of illicit flows into digital currency services. Center on Sanctions & Illicit Finance memorandum, January 2018
4.
Zurück zum Zitat Liao, K., Zhao, Z., et al.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1–13. IEEE (2016) Liao, K., Zhao, Z., et al.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1–13. IEEE (2016)
5.
Zurück zum Zitat Meiklejohn, S., Pomarole, M., et al.: A fistful of bitcoins: characterizing payments among men with no name. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013) Meiklejohn, S., Pomarole, M., et al.: A fistful of bitcoins: characterizing payments among men with no name. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM (2013)
7.
Zurück zum Zitat Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466. IEEE (2017) Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466. IEEE (2017)
8.
Zurück zum Zitat Nick, J.D.: Data-driven de-anonymization in bitcoin. Master’s thesis, ETH-Zürich (2015) Nick, J.D.: Data-driven de-anonymization in bitcoin. Master’s thesis, ETH-Zürich (2015)
12.
Zurück zum Zitat Kaminsky, D.: Black ops of TCP/IP. Black Hat USA, p. 44 (2011) Kaminsky, D.: Black ops of TCP/IP. Black Hat USA, p. 44 (2011)
13.
Zurück zum Zitat Biryukov, A., Pustogarov, I.: Bitcoin over tor isn’t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122–134. IEEE (2015) Biryukov, A., Pustogarov, I.: Bitcoin over tor isn’t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122–134. IEEE (2015)
16.
Zurück zum Zitat Sanjaya, C., et al.: Revenue prediction using artificial neural network. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 97–99. IEEE (2010) Sanjaya, C., et al.: Revenue prediction using artificial neural network. In: 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, pp. 97–99. IEEE (2010)
17.
Zurück zum Zitat Bartoletti, M., et al.: Data mining for detecting Bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75–84. IEEE (2018) Bartoletti, M., et al.: Data mining for detecting Bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75–84. IEEE (2018)
19.
Zurück zum Zitat Fan, X., Hongbo, X., Liang, Y.: A sock-puppet relation detection method on social network. J. Chin. Inf. Process. 28(6), 162–168 (2014) Fan, X., Hongbo, X., Liang, Y.: A sock-puppet relation detection method on social network. J. Chin. Inf. Process. 28(6), 162–168 (2014)
20.
21.
Zurück zum Zitat Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29(5), 1189–1232 (2001)MathSciNetCrossRef Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29(5), 1189–1232 (2001)MathSciNetCrossRef
22.
Zurück zum Zitat Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794. ACM (2016) Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794. ACM (2016)
23.
Zurück zum Zitat Ke, G., Meng, Q., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, pp. 3146–3154 (2017) Ke, G., Meng, Q., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, pp. 3146–3154 (2017)
25.
Zurück zum Zitat Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807–814 (2010) Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 807–814 (2010)
26.
Zurück zum Zitat Liu, W., Wen, Y., Yu, Z., Yang, M.: Large-margin softmax loss for convolutional neural networks. In: ICML, vol. 2 (2016) Liu, W., Wen, Y., Yu, Z., Yang, M.: Large-margin softmax loss for convolutional neural networks. In: ICML, vol. 2 (2016)
28.
Zurück zum Zitat Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: evidence from mining the Mt. Gox transaction network. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 964–972. IEEE (2019) Chen, W., Wu, J., Zheng, Z., Chen, C., Zhou, Y.: Market manipulation of bitcoin: evidence from mining the Mt. Gox transaction network. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 964–972. IEEE (2019)
29.
Zurück zum Zitat Xing, Y., Li, X., et al.: Research on de-anonymization techniques of bitcoin trading network. A Thesis Submitted to Southeast University For the Academic Degree of Master of Engineering, China (2017) Xing, Y., Li, X., et al.: Research on de-anonymization techniques of bitcoin trading network. A Thesis Submitted to Southeast University For the Academic Degree of Master of Engineering, China (2017)
30.
Zurück zum Zitat Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)
32.
Zurück zum Zitat Arlot, S., Celisse, A., et al.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010) MathSciNetCrossRef Arlot, S., Celisse, A., et al.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010) MathSciNetCrossRef
33.
Zurück zum Zitat Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. Comput. Sci. (2014) Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. Comput. Sci. (2014)
Metadaten
Titel
A New Bitcoin Address Association Method Using a Two-Level Learner Model
verfasst von
Tengyu Liu
Jingguo Ge
Yulei Wu
Bowei Dai
Liangxiong Li
Zhongjiang Yao
Jifei Wen
Hongbin Shi
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38961-1_31