Abstract
Blockchain has rapidly become one of the hottest Internet technologies as a decentralized and distributed data management solution. Cryptocurrency, one of the most successful applications of blockchain, quickly attracted attention from investors because of its high anonymity, flexibility and rapidity. However, cryptocurrencies are also used by some criminals to commit crimes secretly and they integrate illicit funds into real economy through cryptocurrency exchanges, causing serious impact to economies and societies. Traditional methods for exchanges to prevent financial crimes like Know Your Customer (KYC) have limit effect in the peer-to-peer and decentralized blockchain system. In this work, we propose a system aiming to help cryptocurrency exchanges to detect suspicious customers on the blockchain network. Besides the traditional KYC procedures, several machine learning models are used to check the account addresses submitted by the customers and to detect suspicious address in daily transaction. The detection models use the open-source data from websites and forums instead of private data from governments or institutions, and can detect the top five financial crimes in cryptocurrencies simultaneously. Finally, a visualization of transactions is proposed to better demonstrate the fund flows of suspicious customers for further analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 30 Apr 2022
The 2021 Crypto Crime Report. https://go.chainalysis.com/2021-Crypto-Crime-Report.html. Accessed 30 Apr 2022
2019 Crypto Crime Report: Decoding Hacks, Darknet Markets, and Scams. https://go.chainalysis.com/2019-Crypto-Crime-Report.htm. Accessed 30 Apr 2022
Foley, S., Karlsen, J.R., Putniņš, T.J.: Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev. Financ. Stud. 32(5), 1798–1853 (2019)
Brenig, C., Accorsi, R., Müller, G.: Economic analysis of cryptocurrency backed money laundering. In: ECIS 2015 Completed Research Papers (2015)
New OFAC Sanctions and DOJ Complaint for North Korea-Linked Cryptocurrency Laundering Scheme: What You Need to Know (2020). https://blog.chainalysis.com/reports/north-korea-cryptocurrency-addresses-ofac-doj-march-2020/. Accessed 30 Apr 2022
Most Crypto Exchanges Still Don’t Have Clear KYC Policies: Report. https://alekbo.com/cryptocoins/most-crypto-exchanges-still-dont-have-clear-kyc-policies-report.html. Accessed 30 Apr 2022
Wang, S.-N., Yang, J.-G.: A money laundering risk evaluation method based on decision tree. In: International Conference on Machine Learning & Cybernetics (2007)
Rafał, D., Jan, S., Wojciech, F.: The application of social network analysis algorithms in a system supporting money laundering detection. Inf. Sci. 295, 18–32 (2015)
Wang, D., Lin, J., Cui, P., et al.: A semi-supervised graph attentive network for financial fraud detection. In: 2019 IEEE International Conference on Data Mining (ICDM) (2019)
Raza, S., Haider, S.: Suspicious activity reporting using dynamic Bayesian networks. Procedia Comput. Sci. 3, 987–991 (2011)
Li, X., Liu, S., Li, Z., et al.: FlowScope: spotting money laundering based on graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 4731–4738 (2020)
Liu, K., Yu, T.: An improved support-vector network model for anti-money laundering. In: Fifth International Conference on Management of e-Commerce and e-Government, pp. 193–196 (2011)
Mark, W., Giacomo, D., Jie, C., et al.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv:1908.02591 (2019)
Tam, D.S.H., Lau, W.C., Hu, B., et al.: Identifying illicit accounts in large scale e-payment networks-a graph representation learning approach. arXiv:1906.05546 (2019)
Kanemura, K., Toyoda, K., Ohtsuki, T.: Identification of darknet markets’ bitcoin addresses by voting per-address classification results. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 154–158 (2019)
Akcora, C.G., Li, Y., Gel, Y.R., et al.: Topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:1906.07852 (2019)
Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75–84 (2018)
Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99–111. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-9213-3_8
Michalski, R., Dziubałtowska, D., Macek, P.: Revealing the character of nodes in a blockchain with supervised learning. IEEE Access 8, 109639–109647 (2020)
Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., Kumari, S.: Supervised learning model for identifying illegal activities in Bitcoin. Appl. Intell. 51(6), 3824–3843 (2020). https://doi.org/10.1007/s10489-020-02048-w
Lee, C., Maharjan, S., Ko, K., Woo, J., Hong, J.-K.: Machine learning based bitcoin address classification. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 517–531. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-9213-3_40
Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466 (2017)
Investor.gov: Investor Alert: Ponzi Schemes Using Virtual Currencies (2013)
Norvill, R., Steichen, M., Shbair, W.M., et al.: Demo: blockchain for the simplification and automation of KYC result sharing. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 9–10 (2019)
Leo, B.: Random forests. Mach. Learn. 45, 5–32 (2001)
Utgoff, P.E.: Incremental induction of decision trees. Mach. Learn. 4, 161–186 (1989)
Hosmer, D.W., Lemeshow, S.: Applied logistic regression, vol. 398 (2013)
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273–297 (1995)
Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46, 175–185 (1992)
Rajput, V.U.: Research on know your customer (KYC). Int. J. Sci. Res. Publ. 3(7), 1–6 (2013)
Acknowledgements
This work was supported by the National Key R&D Program of China (No. 2020YFB1006000).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jiang, H., Zhang, K., Ma, X., Sun, Y., Ma, Y. (2022). Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges. In: Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2022. Communications in Computer and Information Science, vol 1679. Springer, Singapore. https://doi.org/10.1007/978-981-19-8043-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-19-8043-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8042-8
Online ISBN: 978-981-19-8043-5
eBook Packages: Computer ScienceComputer Science (R0)