Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2023

13-09-2023

Predicting functional roles of Ethereum blockchain addresses

Authors: Tania Saleem, Muhammad Ismaeel, Muhammad Umar Janjua, Abdul Rehman Ali, Awab Aqib, Ali Ahmed, Saeed Ul Hassan

Published in: Peer-to-Peer Networking and Applications | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Ethereum is one of the largest blockchain programming platforms. Users in Ethereum are identified using public-private key addresses, which are difficult to connect to real-world identities. This has led to a variety of illegal activities being encouraged. However, based on their transactions’ functional roles, these addresses can be linked and identified. In this paper, we proposed a methodology for predicting the functional roles of Ethereum addresses using machine learning. We build machine learning models to predict the functional role of an address based on various features derived from the transactional history over varying window sizes. We have used labeled dataset of 300 million transactions that are publicly available on the Ethereum blockchain. The test data results show that the XGBoost classifier with eleven features vector and 200 window sizes can predict the role of an unseen address with the best achievable accuracy of 73%. We have also trained and tested the deep learning models on the dataset, CNN model predicted the labels with 86% accuracy. Using machine learning models, we have also devised a measure of anonymity and compared it for unlabelled addresses. Further, to qualitatively validate our prediction, we also discovered Ethereum addresses used on the dark web pages and predicted their functional roles with our trained models. Most of these addresses were behaving like Wallet_app, Shapeshift, and Mining and this prediction was aligned with the background information extracted from the context of address usage on the dark web page.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
5.
go back to reference Foley S, Karlsen JR, Putniņš TJ (2019) Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? Rev Financ Stud 32(5):1798–1853CrossRef Foley S, Karlsen JR, Putniņš TJ (2019) Sex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies? Rev Financ Stud 32(5):1798–1853CrossRef
7.
go back to reference Yeoh P (2019) Banks’ vulnerabilities to money laundering activities. J Money Laund Control Yeoh P (2019) Banks’ vulnerabilities to money laundering activities. J Money Laund Control
9.
go back to reference Harlev MA, SunYin H, Langenheldt KC, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences, pp 3497–3506 Harlev MA, SunYin H, Langenheldt KC, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences, pp 3497–3506
10.
go back to reference Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS ’14, pp. 15–29. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2660267.2660379 Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS ’14, pp. 15–29. Association for Computing Machinery, New York, NY, USA. https://​doi.​org/​10.​1145/​2660267.​2660379
11.
go back to reference Santamaria Ortega M (2013) The bitcoin transaction graph anonymity Santamaria Ortega M (2013) The bitcoin transaction graph anonymity
12.
go back to reference Spagnuolo M, Maggi F, Zanero S (2014) Bitiodine: Extracting intelligence from the bitcoin network. In: International Conference on Financial Cryptography and Data Security, pp. 457–468. Springer Spagnuolo M, Maggi F, Zanero S (2014) Bitiodine: Extracting intelligence from the bitcoin network. In: International Conference on Financial Cryptography and Data Security, pp. 457–468. Springer
13.
go back to reference Klusman R (2018) Deanonymisation in ethereum using existing methods for bitcoin Klusman R (2018) Deanonymisation in ethereum using existing methods for bitcoin
14.
go back to reference Béres F, Seres IA, Benczúr AA, Quintyne-Collins M (2020) Blockchain is watching you: Profiling and deanonymizing ethereum users. arXiv preprint arXiv:2005.14051 Béres F, Seres IA, Benczúr AA, Quintyne-Collins M (2020) Blockchain is watching you: Profiling and deanonymizing ethereum users. arXiv preprint arXiv:​2005.​14051
15.
go back to reference Victor F (2017) Address clustering heuristics for Ethereum Victor F (2017) Address clustering heuristics for Ethereum
16.
go back to reference Abraham J, Higdon D, Nelson J, Ibarra J (2018) Cryptocurrency price prediction using tweet volumes and sentiment analysis. SMU Data Sci Rev 1(3):1 Abraham J, Higdon D, Nelson J, Ibarra J (2018) Cryptocurrency price prediction using tweet volumes and sentiment analysis. SMU Data Sci Rev 1(3):1
17.
go back to reference Chen M, Narwal N, Schultz M (2019) Predicting price changes in ethereum. International Journal on Computer Science and Engineering (IJCSE) ISSN, 0975–3397 Chen M, Narwal N, Schultz M (2019) Predicting price changes in ethereum. International Journal on Computer Science and Engineering (IJCSE) ISSN, 0975–3397
18.
go back to reference Kumar D, Rath S (2020) Predicting the trends of price for ethereum using deep learning techniques. In: Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 103–114. Springer Kumar D, Rath S (2020) Predicting the trends of price for ethereum using deep learning techniques. In: Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 103–114. Springer
19.
go back to reference Lamon C, Nielsen E, Redondo E (2017) Cryptocurrency price prediction using news and social media sentiment. SMU Data Sci Rev 1(3):1–22 Lamon C, Nielsen E, Redondo E (2017) Cryptocurrency price prediction using news and social media sentiment. SMU Data Sci Rev 1(3):1–22
20.
go back to reference Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhange X (2018) Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 1484–1492. IEEE Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhange X (2018) Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 1484–1492. IEEE
22.
go back to reference Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564 Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564
24.
go back to reference Qian C, Ouyang K (2015) Predicting bitcoin transactions from blockchain records through recursive clustering Qian C, Ouyang K (2015) Predicting bitcoin transactions from blockchain records through recursive clustering
25.
go back to reference Ron D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, pp 6–24. Springer Ron D, Shamir A (2013) Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, pp 6–24. Springer
26.
go back to reference Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp 127–140 Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp 127–140
27.
go back to reference Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp 55–62. IEEE Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp 55–62. IEEE
28.
go back to reference Ermilov D, Panov M, Yanovich Y (2017) Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466. IEEE Ermilov D, Panov M, Yanovich Y (2017) Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466. IEEE
29.
go back to reference Wu J, Lin D, Zheng Z, Yuan Q (2019) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. arXiv preprint arXiv:1905.08038 Wu J, Lin D, Zheng Z, Yuan Q (2019) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. arXiv preprint arXiv:​1905.​08038
30.
go back to reference Ferretti S, D’Angelo G (2019) On the ethereum blockchain structure: A complex networks theory perspective. Concurr Comput Pract Exp 5493 Ferretti S, D’Angelo G (2019) On the ethereum blockchain structure: A complex networks theory perspective. Concurr Comput Pract Exp 5493
31.
go back to reference Chan W, Olmsted A (2017) Ethereum transaction graph analysis. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp 498–500. IEEE Chan W, Olmsted A (2017) Ethereum transaction graph analysis. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp 498–500. IEEE
33.
go back to reference Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp 1409–1418 Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp 1409–1418
36.
go back to reference Payette J, Schwager S, Murphy JW (2017) Characterizing the ethereum address space Payette J, Schwager S, Murphy JW (2017) Characterizing the ethereum address space
49.
go back to reference Goodison SE, Woods D, Barnum JD, Kemerer AR, Jackson BA (2019) Identifying law enforcement needs for conducting criminal investigations involving evidence on the dark web Goodison SE, Woods D, Barnum JD, Kemerer AR, Jackson BA (2019) Identifying law enforcement needs for conducting criminal investigations involving evidence on the dark web
50.
go back to reference Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and Distributed System Security Symposium, pp 1–15. Internet Society Lee S, Yoon C, Kang H, Kim Y, Kim Y, Han D, Son S, Shin S (2019) Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web. In: Network and Distributed System Security Symposium, pp 1–15. Internet Society
Metadata
Title
Predicting functional roles of Ethereum blockchain addresses
Authors
Tania Saleem
Muhammad Ismaeel
Muhammad Umar Janjua
Abdul Rehman Ali
Awab Aqib
Ali Ahmed
Saeed Ul Hassan
Publication date
13-09-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01553-2

Other articles of this Issue 6/2023

Peer-to-Peer Networking and Applications 6/2023 Go to the issue

Premium Partner