Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3477314.3507185acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Manipulation detection in cryptocurrency markets: an anomaly and change detection based approach

Published: 06 May 2022 Publication History

Abstract

As a financial asset, cryptocurrencies innovated the financial industry in different ways. However, the lack of regulations and transparency in cryptocurrency markets is hindering the industry from reaching its full potential. There is a need for extensive technical analysis of the cryptocurrency market data to detect possible market manipulation attempts. Anomaly detection techniques can reveal information about abnormal activities in the market and provide insights on manipulation attempts. In this study, a robust unsupervised anomaly detection tool (ADT) is developed for this purpose. Experiments show that ADT outperforms a set of methods in detecting the anomalies in features extracted from the cryptocurrency exchanges data and on a set of benchmark data sets.

References

[1]
R.K. Aggarwal and G. Wu. 2006. Stock Market Manipulations. Journal of Business 79, 4 (2006), 1915--1954.
[2]
M. Ahmed, A.N. Mahmood, and J. Hu. 2016. A survey of network anomaly detection techniques. Journal of Network and Computer Applications 60 (2016), 19--31.
[3]
F. Allen and D. Gale. 1992. Stock-Price Manipulation. The Review of Financial Studies 5, 3 (1992), 503--529.
[4]
F. Angiulli and C. Pizzuti. 2002. Fast Outlier Detection in High Dimensional Spaces. In ECML/PKDD.
[5]
M.M. Breunig, H. Kriegel, R.T. Ng, and J. Sander. 2000. LOF: Identifying Density-Based Local Outliers. In SIGMOD.
[6]
M. Brunnermeier and L. Pedersen. 2009. Market Liquidity and Funding Liquidity. The Review of Financial Studies 22, 6 (2009), 2201--2238.
[7]
Y. Cao, Y. Li, S. Coleman, A. Belatreche, and T.M. McGinnity. 2014. Detecting price manipulation in the financial market. In IEEE Conference on Computational Intelligence for Financial Engineering and Economics.
[8]
Y. Cao, Y. Li, S. Coleman, A. Belatreche, and T.M. McGinnity. 2015. Detecting Wash Trade in Financial Market Using Digraphs and Dynamic Programming. IEEE Transactions on Neural Networks and Learning Systems 27, 11 (2015), 2351--2363.
[9]
D. H. Freedman, R. Pisani, and R. Purves. 1978. Statistics. W. W. Norton & Company.
[10]
J. Gama, I. Zliobaite, A. Bifet, M. Pechenizkiy, and A. Bouchachia. 2014. A Survey on Concept Drift Adaptation. Comput. Surveys 46, 4 (2014).
[11]
J. Huang, Q. Zhu, L. Yang, and J. Feng. 2016. A non-parameter outlier detection algorithm based on Natural Neighbor. Knowledge-Based Systems 92 (2016), 71--77.
[12]
J. Kamps and B. Kleinberg. 2018. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science 7 (2018).
[13]
E.M. Knorr and R.T. Ng. 1998. Algorithms for Mining Distance-Based Outliers in Large Datasets. In VLDB.
[14]
Longin Jan Latecki, Aleksandar Lazarevic, and Dragoljub Pokrajac. 2007. Outlier Detection with Kernel Density Functions (MLDM).
[15]
F.T. Liu and K.M. Ting. 2012. Isolation-based Anomaly Detection. TKDD (2012).
[16]
I. Makarov and A. Schoar. 2020. Trading and arbitrage in cryptocurrency markets. Journal of Financial Economics 135, 2 (2020).
[17]
P. Monamo, V. Marivate, and B. Twala. 2016. A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers. In ICMLA.
[18]
P. Monamo, V. Marivate, and B. Twala. 2016. Unsupervised learning for robust Bitcoin fraud detection. Information Security for South Africa (2016).
[19]
A.I. Nilsen. 2019. Limelight: Real-Time Detection of Pump-and-Dump Events on Cryptocurrency Exchanges using Deep Learning. University of Norway Master's Thesis (2019).
[20]
S. Papadimitriou, H. Kitagawa, P.B. Gibbons, and C. Faoutsos. 2003. LOCI: Fast Outlier Detection using the Local Correlation Integral. In ICDE.
[21]
T.T. Pham and S. Lee. 2016. Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods. Stanford University Research (2016).
[22]
B. R. Preiss. 1999. Data Structures and Algorithms with Object-Oriented Design Patterns in Java (1999).
[23]
A. Qahtan, B. Alharbi, S. Wang, and X. Zhang. 2015. A PCA-Based Change Detection Framework for Multidimensional Data Streams. In KDD.
[24]
A. Qahtan, X. Zhang, and S. Wang. 2012. Efficient Estimation of Dynamic Density Functions with an Application to Outlier Detection. CIKM (2012).
[25]
T. Sethi and M. Kantardzic. 2017. On the reliable detection of concept drift from streaming unlabeled data. Expert Systems with Applications 82 (2017), 77--99.
[26]
P. Weber and B. Rosenow. 2005. Order book approach to price impact. Quantitative Finance 5, 4 (2005), 357--364.
[27]
Yahoo! Webscope, [Dataset]. [n.d.]. S5 - A Labeled Anomaly Detection Dataset (v1.0). http://webscope.sandbox.yahoo.com

Cited By

View all
  • (2024)Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A SurveyAlgorithms10.3390/a1705020117:5(201)Online publication date: 9-May-2024
  • (2024)From Creation to Exploitation: The Oracle Lifecycle2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)10.1109/SANER-C62648.2024.00009(23-34)Online publication date: 12-Mar-2024
  • (2023)What Financial Crimes Are Hidden in Metaverse? Taxonomy and CountermeasuresFrom Blockchain to Web3 & Metaverse10.1007/978-981-99-3648-9_7(181-214)Online publication date: 25-May-2023

Index Terms

  1. Manipulation detection in cryptocurrency markets: an anomaly and change detection based approach
          Index terms have been assigned to the content through auto-classification.

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing
          April 2022
          2099 pages
          ISBN:9781450387132
          DOI:10.1145/3477314
          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 06 May 2022

          Check for updates

          Qualifiers

          • Poster

          Conference

          SAC '22
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)64
          • Downloads (Last 6 weeks)6
          Reflects downloads up to 07 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A SurveyAlgorithms10.3390/a1705020117:5(201)Online publication date: 9-May-2024
          • (2024)From Creation to Exploitation: The Oracle Lifecycle2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)10.1109/SANER-C62648.2024.00009(23-34)Online publication date: 12-Mar-2024
          • (2023)What Financial Crimes Are Hidden in Metaverse? Taxonomy and CountermeasuresFrom Blockchain to Web3 & Metaverse10.1007/978-981-99-3648-9_7(181-214)Online publication date: 25-May-2023

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media