Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3511808.3557212acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

Ledgit: A Service to Diagnose Illicit Addresses on Blockchain using Multi-modal Unsupervised Learning

Published: 17 October 2022 Publication History

Abstract

Distributed ledger technology benefits society by enabling an ecosystem of decentralised finance. However the pseudo-anonymised nature of transactions has also been an enabler of new routes for illicit activities ranging from individual scams to organised crimes. Current solutions for identifying addresses involved in illicit activities (illicit addresses) rely on commercial intelligence services, which are costly due to the intensive investigative efforts required. We propose Ledgit, an automatic real-time service for diagnosing illicit addresses on the Bitcoin blockchain. Ledgit is based solely on publicly available data, and uses an unsupervised clustering method that combines information from textual reports and the blockchain graph to assign a risk score that a Bitcoin address is involved in illicit activities. We verify the system with labeled addresses, showing high performance in identifying illicit addresses. Finally, we provide an intuitive user interface that provides accessible risk assessment with graph and report analytics.

Supplementary Material

MP4 File (CIKM22-demo171.mp4)
This video introduces the user interface of Ledgit. It demonstrates the sampling results and and risk diagnosis of two known blockchain addresses.

References

[1]
2008. Blockchain.com. https://www.Blockchain.com/
[2]
2019. Financial Conduct Authority, Joint Money Laundering Steering Group (JMLSG) PART II, Chapter 22. https://www.fca.org.uk/firms/financial-crime/ cryptoassets-aml-ctf-regime
[3]
2020. European Commission, Directorate-General for Financial Stability, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on Markets in Crypto-assets, and amending Directive (EU). https://eur-lex. europa.eu/legal-content/EN/ALL/?uri=CELEX:52020PC0593
[4]
2022. . National Bureau for Counter Terror Financing of Israel. https://nbctf. mod.gov.il/en/seizures/Pages/Blockchain1.aspx
[5]
2022. . United States Office of Foreign Assets Control. https://www.treasury. gov/ofac/downloads/sdnlist.pdf
[6]
2022. BitcoinAbuse. https://www.bitcoinabuse.com/
[7]
2022. Scam-alert.io. https://scam-alert.io
[8]
Charu C. Aggarwal and Chandan K. Reddy. 2014. Data clustering. Algorithms and applications. Chapman&Hall/CRC Data mining and Knowledge Discovery series, Londra (2014).
[9]
Ismail Alarab, Simant Prakoonwit, and Mohamed Ikbal Nacer. 2020. Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain. In Proceedings of the 2020 5th International Conference on Machine Learning Technologies. 23--27.
[10]
Humam Alwassel, Dhruv Mahajan, Bruno Korbar, Lorenzo Torresani, Bernard Ghanem, and Du Tran. 2020. Self-supervised learning by cross-modal audiovideo clustering. Advances in Neural Information Processing Systems 33 (2020), 9758--9770.
[11]
Massimo Bartoletti, Barbara Pes, and Sergio Serusi. 2018. Data Mining for Detecting Bitcoin Ponzi Schemes. In 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 75--84. https://doi.org/10.1109/CVCBT.2018.00014
[12]
Joseph R. Biden. 2022. Executive order on ensuring responsible development of Digital assets. https://www.whitehouse.gov/briefing-room/presidentialactions/ 2022/03/09/executive-order-on-ensuring-responsible-development-ofdigital- assets/
[13]
Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag, Berlin, Heidelberg.
[14]
Ramiro Daniel Camino, Radu State, Leandro Montero, and Petko Valtchev. 2017. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW). 787-- 796. https://doi.org/10.1109/ICDMW.2017.109
[15]
Andrzej CICHOCKI and Anh-Huy PHAN. 2009. Fast Local Algorithms for Large Scale Nonnegative Matrix and Tensor Factorizations. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A, 3 (2009), 708--721. https://doi.org/10.1587/transfun.E92.A.708
[16]
Shaltiel Eloul, Sean J Moran, and Jacob Mendel. 2021. Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback. In Annual Computer Security Applications Conference (Virtual Event, USA) (ACSAC). Association for Computing Machinery, New York, NY, USA, 761--772. https://doi.org/10.1145/3485832.3485913
[17]
Yining Hu, Suranga Seneviratne, Kanchana Thilakarathna, Kensuke Fukuda, and Aruna Seneviratne. 2019. Characterizing and Detecting Money Laundering Activities on the Bitcoin Network. arXiv:1912.12060 [cs.SI]
[18]
Xiao Fan Liu, Xin-Jian Jiang, Si-Hao Liu, and Chi Kong Tse. 2021. Knowledge Discovery in Cryptocurrency Transactions: A Survey. IEEE Access 9 (2021), 37229--37254. https://doi.org/10.1109/ACCESS.2021.3062652
[19]
Stuart Lloyd. 1982. Least squares quantization in PCM. IEEE transactions on information theory 28, 2 (1982), 129--137.
[20]
Patrick Monamo, Vukosi Marivate, and Bheki Twala. 2016. Unsupervised learning for robust Bitcoin fraud detection. In 2016 Information Security for South Africa (ISSA). IEEE, 129--134.
[21]
Patrick M. Monamo, Vukosi Marivate, and Bhesipho Twala. 2016. A Multifaceted Approach to Bitcoin Fraud Detection: Global and Local Outliers. In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). 188--194. https://doi.org/10.1109/ICMLA.2016.0039
[22]
Arjun Mukherjee. 2015. Detecting deceptive opinion spam using linguistics, behavioral and statistical modeling. In Proceedings of the 53rd annual meeting of the association for computational linguistics and the 7th international joint conference on natural language processing: Tutorial abstracts. 21--22.
[23]
Arjun Mukherjee, Abhinav Kumar, Bing Liu, Junhui Wang, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. 2013. Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. 632--640.
[24]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.
[25]
Emily Nicolle. 2022. U.K. Crime Agency Wants to Regulate Crypto Transaction Mixers. https://www.bloomberg.com/news/articles/2022-03--15/u-k-crimeagency- wants-to-regulate-crypto-transaction-mixers
[26]
Micha? Ostapowicz and Kamil ?bikowski. 2019. Detecting Fraudulent Accounts on Blockchain: A Supervised Approach. In Web Information Systems Engineering -- WISE 2019, Reynold Cheng, Nikos Mamoulis, Yizhou Sun, and Xin Huang (Eds.). Springer International Publishing, Cham, 18--31.
[27]
Masarah Paquet-Clouston, Bernhard Haslhofer, and Benoit Dupont. 2018. Ransomware Payments in the Bitcoin Ecosystem. https://doi.org/10.5281/zenodo. 1238041
[28]
Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hiroki Kanezashi, Tim Kaler, Tao B. Schardl, and Charles E. Leiserson. 2019. EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs. arXiv:1902.10191 [cs.LG]
[29]
Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016).
[30]
Thai Pham and Steven Lee. 2017. Anomaly Detection in the Bitcoin System - A Network Perspective. arXiv:1611.03942 [cs.SI]
[31]
Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security. Springer, 6--24.
[32]
Dylan Vassallo, Vincent Vella, and Joshua Ellul. 2021. Application of Gradient Boosting Algorithms for Anti-money Laundering in Cryptocurrencies. SN Computer Science 2, 3 (2021), 1--15.
[33]
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. https://doi.org/10.48550/ARXIV.1908.02591
[34]
Jiajing Wu, Jieli Liu, Weili Chen, Huawei Huang, Zibin Zheng, and Yan Zhang. 2021. Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2021).
[35]
Yinfei Yang, Daniel Cer, Amin Ahmad, Mandy Guo, Jax Law, Noah Constant, Gustavo Hernandez Abrego, Steve Yuan, Chris Tar, Yun-Hsuan Sung, Brian Strope, and Ray Kurzweil. 2019. Multilingual Universal Sentence Encoder for Semantic Retrieval. https://doi.org/10.48550/ARXIV.1907.04307
[36]
Haohua Sun Yin and Ravi Vatrapu. 2017. A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In 2017 IEEE International Conference on Big Data (Big Data). IEEE, 3690--3699.

Cited By

View all

Index Terms

  1. Ledgit: A Service to Diagnose Illicit Addresses on Blockchain using Multi-modal Unsupervised Learning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '22: Proceedings of the 31st ACM International Conference on Information & Knowledge Management
      October 2022
      5274 pages
      ISBN:9781450392365
      DOI:10.1145/3511808
      • General Chairs:
      • Mohammad Al Hasan,
      • Li Xiong
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 October 2022

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. blockchain
      2. multimodality
      3. risk
      4. unsupervised learning

      Qualifiers

      • Short-paper

      Conference

      CIKM '22
      Sponsor:

      Acceptance Rates

      CIKM '22 Paper Acceptance Rate 621 of 2,257 submissions, 28%;
      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 31 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media