Skip to main content

Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1679))

Included in the following conference series:

  • 609 Accesses

Abstract

Blockchain has rapidly become one of the hottest Internet technologies as a decentralized and distributed data management solution. Cryptocurrency, one of the most successful applications of blockchain, quickly attracted attention from investors because of its high anonymity, flexibility and rapidity. However, cryptocurrencies are also used by some criminals to commit crimes secretly and they integrate illicit funds into real economy through cryptocurrency exchanges, causing serious impact to economies and societies. Traditional methods for exchanges to prevent financial crimes like Know Your Customer (KYC) have limit effect in the peer-to-peer and decentralized blockchain system. In this work, we propose a system aiming to help cryptocurrency exchanges to detect suspicious customers on the blockchain network. Besides the traditional KYC procedures, several machine learning models are used to check the account addresses submitted by the customers and to detect suspicious address in daily transaction. The detection models use the open-source data from websites and forums instead of private data from governments or institutions, and can detect the top five financial crimes in cryptocurrencies simultaneously. Finally, a visualization of transactions is proposed to better demonstrate the fund flows of suspicious customers for further analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf. Accessed 30 Apr 2022

  2. The 2021 Crypto Crime Report. https://go.chainalysis.com/2021-Crypto-Crime-Report.html. Accessed 30 Apr 2022

  3. 2019 Crypto Crime Report: Decoding Hacks, Darknet Markets, and Scams. https://go.chainalysis.com/2019-Crypto-Crime-Report.htm. Accessed 30 Apr 2022

  4. Foley, S., Karlsen, J.R., Putniņš, T.J.: Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev. Financ. Stud. 32(5), 1798–1853 (2019)

    Article  Google Scholar 

  5. Brenig, C., Accorsi, R., Müller, G.: Economic analysis of cryptocurrency backed money laundering. In: ECIS 2015 Completed Research Papers (2015)

    Google Scholar 

  6. New OFAC Sanctions and DOJ Complaint for North Korea-Linked Cryptocurrency Laundering Scheme: What You Need to Know (2020). https://blog.chainalysis.com/reports/north-korea-cryptocurrency-addresses-ofac-doj-march-2020/. Accessed 30 Apr 2022

  7. Most Crypto Exchanges Still Don’t Have Clear KYC Policies: Report. https://alekbo.com/cryptocoins/most-crypto-exchanges-still-dont-have-clear-kyc-policies-report.html. Accessed 30 Apr 2022

  8. Wang, S.-N., Yang, J.-G.: A money laundering risk evaluation method based on decision tree. In: International Conference on Machine Learning & Cybernetics (2007)

    Google Scholar 

  9. Rafał, D., Jan, S., Wojciech, F.: The application of social network analysis algorithms in a system supporting money laundering detection. Inf. Sci. 295, 18–32 (2015)

    Article  MathSciNet  Google Scholar 

  10. Wang, D., Lin, J., Cui, P., et al.: A semi-supervised graph attentive network for financial fraud detection. In: 2019 IEEE International Conference on Data Mining (ICDM) (2019)

    Google Scholar 

  11. Raza, S., Haider, S.: Suspicious activity reporting using dynamic Bayesian networks. Procedia Comput. Sci. 3, 987–991 (2011)

    Article  Google Scholar 

  12. Li, X., Liu, S., Li, Z., et al.: FlowScope: spotting money laundering based on graphs. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 4731–4738 (2020)

    Google Scholar 

  13. Liu, K., Yu, T.: An improved support-vector network model for anti-money laundering. In: Fifth International Conference on Management of e-Commerce and e-Government, pp. 193–196 (2011)

    Google Scholar 

  14. Mark, W., Giacomo, D., Jie, C., et al.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv:1908.02591 (2019)

  15. Tam, D.S.H., Lau, W.C., Hu, B., et al.: Identifying illicit accounts in large scale e-payment networks-a graph representation learning approach. arXiv:1906.05546 (2019)

  16. Kanemura, K., Toyoda, K., Ohtsuki, T.: Identification of darknet markets’ bitcoin addresses by voting per-address classification results. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 154–158 (2019)

    Google Scholar 

  17. Akcora, C.G., Li, Y., Gel, Y.R., et al.: Topological data analysis for ransomware detection on the bitcoin blockchain. arXiv:1906.07852 (2019)

  18. Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75–84 (2018)

    Google Scholar 

  19. Li, Y., Cai, Y., Tian, H., Xue, G., Zheng, Z.: Identifying illicit addresses in bitcoin network. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 99–111. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-9213-3_8

    Chapter  Google Scholar 

  20. Michalski, R., Dziubałtowska, D., Macek, P.: Revealing the character of nodes in a blockchain with supervised learning. IEEE Access 8, 109639–109647 (2020)

    Article  Google Scholar 

  21. Nerurkar, P., Bhirud, S., Patel, D., Ludinard, R., Busnel, Y., Kumari, S.: Supervised learning model for identifying illegal activities in Bitcoin. Appl. Intell. 51(6), 3824–3843 (2020). https://doi.org/10.1007/s10489-020-02048-w

    Article  Google Scholar 

  22. Lee, C., Maharjan, S., Ko, K., Woo, J., Hong, J.-K.: Machine learning based bitcoin address classification. In: Zheng, Z., Dai, H.-N., Fu, X., Chen, B. (eds.) BlockSys 2020. CCIS, vol. 1267, pp. 517–531. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-9213-3_40

    Chapter  Google Scholar 

  23. Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In: 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 461–466 (2017)

    Google Scholar 

  24. Investor.gov: Investor Alert: Ponzi Schemes Using Virtual Currencies (2013)

    Google Scholar 

  25. Norvill, R., Steichen, M., Shbair, W.M., et al.: Demo: blockchain for the simplification and automation of KYC result sharing. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 9–10 (2019)

    Google Scholar 

  26. Leo, B.: Random forests. Mach. Learn. 45, 5–32 (2001)

    Article  MATH  Google Scholar 

  27. Utgoff, P.E.: Incremental induction of decision trees. Mach. Learn. 4, 161–186 (1989)

    Article  Google Scholar 

  28. Hosmer, D.W., Lemeshow, S.: Applied logistic regression, vol. 398 (2013)

    Google Scholar 

  29. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273–297 (1995)

    Article  MATH  Google Scholar 

  30. Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46, 175–185 (1992)

    MathSciNet  Google Scholar 

  31. Rajput, V.U.: Research on know your customer (KYC). Int. J. Sci. Res. Publ. 3(7), 1–6 (2013)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Key R&D Program of China (No. 2020YFB1006000).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Ma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jiang, H., Zhang, K., Ma, X., Sun, Y., Ma, Y. (2022). Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges. In: Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2022. Communications in Computer and Information Science, vol 1679. Springer, Singapore. https://doi.org/10.1007/978-981-19-8043-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8043-5_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8042-8

  • Online ISBN: 978-981-19-8043-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics