2020
DOI: 10.3389/fcomp.2020.600596
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Techniques for Illicit Bitcoin Transactions

Abstract: This comprehensive overview of analysis techniques for illicit Bitcoin transactions addresses both technical, machine learning approaches as well as a non-technical, legal, and governance considerations. We focus on the field of ransomware countermeasures to illustrate our points.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…We see potential for these tools to better help criminologists understand the behavior around cryptocurrency. We were informed in heuristic design by computer science work examining transactions through theoretical and mathematical modeling (Meiklejohn et al, 2013; Turner et al, 2020; Zhang et al, 2020). Generally, the design is to consider common inputs and outputs in a transaction.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We see potential for these tools to better help criminologists understand the behavior around cryptocurrency. We were informed in heuristic design by computer science work examining transactions through theoretical and mathematical modeling (Meiklejohn et al, 2013; Turner et al, 2020; Zhang et al, 2020). Generally, the design is to consider common inputs and outputs in a transaction.…”
Section: Methodsmentioning
confidence: 99%
“…Researchers and industry professionals have developed numerous heuristics which utilize different elements of blockchain data for clustering. These data provide avenues through which to exploit the transparency of Bitcoin to gather on- and off-chain information of interest (Turner et al, 2020). Clustering heuristics allow for researchers and practitioners to draw inferences and conclusions surrounding individual and group spending patterns and the flow of money on the blockchain.…”
Section: Literature Reviewmentioning
confidence: 99%
“…are tested to this end. Various network analysis techniques have also been analyzed [9] such as use of LOF (local outlier factor). The difference between these and time series analysis is that network analysis attempts to find anomalies in behavior globally whereas time series attempts to show that two addresses originate from the same user with no mention of the nature of the transactions being made.…”
Section: Related Workmentioning
confidence: 99%
“…The pseudo anonymity given by blockchains make them useful for illegal activities, most commonly ransomware and ponzi schemes. There are already many studies describing techniques for fraud detection [Chen et al 2018], and de-anonymisation [Nick 2015, Turner et al 2020. However, most studies focus on specific algorithms crafted for a single blockchain network.…”
Section: Context and Motivationmentioning
confidence: 99%