Abstract
Cryptocurrencies represented by Bitcoin have fully demonstrated their advantages and great potential in payment and monetary systems during the last decade. The mining pool, which is considered the source of Bitcoin, is the cornerstone of market stability. The surveillance of the mining pool can help regulators effectively assess the overall health of Bitcoin and issues. However, the anonymity of mining-pool miners and the difficulty of analyzing large numbers of transactions limit in-depth analysis. It is also a challenge to achieve intuitive and comprehensive monitoring of multi-source heterogeneous data. In this study, we present SuPoolVisor, an interactive visual analytics system that supports surveillance of the mining pool and de-anonymization by visual reasoning. SuPoolVisor is divided into pool level and address level. At the pool level, we use a sorted stream graph to illustrate the evolution of computing power of pools over time, and glyphs are designed in two other views to demonstrate the influence scope of the mining pool and the migration of pool members. At the address level, we use a force-directed graph and a massive sequence view to present the dynamic address network in the mining pool. Particularly, these two views, together with the Radviz view, support an iterative visual reasoning process for de-anonymization of pool members and provide interactions for cross-view analysis and identity marking. Effectiveness and usability of SuPoolVisor are demonstrated using three cases, in which we cooperate closely with experts in this field.
Similar content being viewed by others
References
Aigner W, Miksch S, Schumann H, et al., 2011. Visualization of Time-Oriented Data. Springer, London, UK. https://doi.org/10.1007/978-0-85729-079-3
Athey S, Parashkevov I, Sarukkai V, et al., 2016. Bitcoin Pricing, Adoption, and Usage: Theory and Evidence. Research Papers 3469, Stanford University, San Francisco, USA.
Barkatullah J, Hanke T, 2015. Goldstrike 1: CoinTerra's first-generation cryptocurrency mining processor for Bitcoin. IEEE Micro, 35(2):68–76. https://doi.org/10.1109/MM.2015.13
Belotti M, Kirati S, Secci S, 2018. Bitcoin pool-hopping detection. Proc IEEE 4th Int Forum on Research and Technology for Society and Industry, p. 1–6. https://doi.org/10.1109/RTSI.2018.8548376
Bistarelli S, Santini F, 2017. Go with the Bitcoin flow, with visual analytics. Proc 12th Int Conf on Availability, Reliability and Security, Article 38.
Böhme R, Christin N, Edelman B, et al., 2015. Bitcoin: economics, technology, and governance. J Econom Persp, 29(2):213–238. https://doi.org/10.1257/jep.29.2.213
Bohr J, Bashir M, 2014. Who uses Bitcoin? An exploration of the Bitcoin community. Proc 12th Annual Int Conf on Privacy, Security and Trust, p. 94–101. https://doi.org/10.1109/PST.2014.6890928
Chen HD, Chen W, Mei HH, et al., 2014. Visual abstraction and exploration of multi-class scatterplots. IEEE Trans Vis Comput Graph, 20(12):1683–1692. https://doi.org/10.1109/TVCG.2014.2346594
Chen SM, Li J, Andrienko G, et al., 2018. Supporting story synthesis: bridging the gap between visual analytics and storytelling. IEEE Trans Vis Comput Graph, 14(8):1. https://doi.org/10.1109/TVCG.2018.2889054
Chen W, Lao TY, Xia J, et al., 2016. Gameflow: narrative visualization of NBA basketball games. IEEE Trans Multim, 18(11):2247–2256. https://doi.org/10.1109/TMM.2016.2614221
Chen W, Huang ZS, Wu FR, et al., 2018a. Vaud: a visual analysis approach for exploring spatio-temporal urban data. IEEE Trans Vis Comput Graph, 24(9):2636–2648. https://doi.org/10.1109/TVCG.2017.2758362
Chen W, Xia J, Wang XM, et al., 2018b. RelationLines: visual reasoning of egocentric relations from heterogeneous urban data. ACM Trans Intell Syst Technol, 10(1):2. https://doi.org/10.1145/3200766
Chen W, Guo FZ, Han DM, et al., 2019. Structure-based suggestive exploration: a new approach for effective exploration of large networks. IEEE Trans Vis Comput Graph, 25(1):555–565. https://doi.org/10.1109/TVCG.2018.2865139
Di Battista G, Di Donato V, Patrignani M, et al., 2015. Bitconeview: visualization of flows in the Bitcoin transaction graph. Proc IEEE Symp on Visualization for Cyber Security, p. 1–8. https://doi.org/10.1109/VIZSEC.2015.7312773
Fleder M, Kester MS, Pillai S, 2015. Bitcoin transaction graph analysis. https://arxiv.org/abs/1502.01657v1
Gencer AE, Basu S, Eyal I, et al., 2018. Decentralization in Bitcoin and Ethereum networks. Proc 22nd Int Conf on Financial Cryptography and Data Security, p. 439–457. https://doi.org/10.1007/978-3-662-58387-6_24
Hoffman P, Grinstein G, Marx K, et al., 1997. DNA visual and analytic data mining. Proc 8th IEEE Visualization Conf, p. 437–441. https://doi.org/10.1109/VISUAL.1997.663916
Isenberg P, Kinkeldey C, Fekete JD, 2017. Exploring entity behavior on the Bitcoin blockchain. Université Paris-Saclay, Paris, France.
Jie L, Chen SM, Zhang K, et al., 2019. COPE: interactive exploration of co-occurrence patterns in spatial time series. IEEE Trans Vis Comput Graph, 25(8):2554–2567. https://doi.org/10.1109/TVCG.2018.2851227
Kim YB, Kim JG, Kim W, et al., 2016. Predicting fluctuations in cryptocurrency transactions based on user comments and replies. PLoS ONE, 11(8):e0161197. https://doi.org/10.1371/journal.pone.0161197
Kinkeldey C, Fekete JD, Isenberg P, 2017. BitConduite: visualizing and analyzing activity on the Bitcoin network. Eurographics Conf on Visualization, p. 3. https://diglib.eg.org:443/handle/10.2312/eurp20171160
Kiran M, Stannett M, 2015. Bitcoin Risk Analysis. NEMODE Policy Paper, p. 1–28.
Kirsh D, 2009. Projection, problem space, and anchoring. Proc 31st Cognitive Science Society, p. 2310–2315.
Koshy P, Koshy D, McDaniel P, 2014. An analysis of anonymity in Bitcoin using P2P network traffic. Proc 18th Int Conf on Financial Cryptography and Data Security, p. 469–485.
Kroll JA, Davey ID, Felten EW, 2013. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. Proc 12th Workshop on the Economics of Information Security, p. 1–21.
Lewenberg Y, Bachrach Y, Sompolinsky Y, et al., 2015. Bitcoin mining pools: a cooperative game theoretic analysis. Proc Int Conf on Autonomous Agents and Multiagent Systems, p. 919–927.
Li J, Chen SM, Chen W, et al., 2020. Semantics-space-time cube. a conceptual framework for systematic analysis of texts in space and time. IEEE Trans Vis Comput Graph, 26(4):1789–1806. https://doi.org/10.1109/TVCG.2018.2882449
Liu MC, Shi JX, Li Z, et al., 2017. Towards better analysis of deep convolutional neural networks. IEEE Trans Vis Comput Graph, 23(1):91–100. https://doi.org/10.1109/TVCG.2016.2598831
Liu MC, Shi JX, Cao KL, et al., 2018. Analyzing the training processes of deep generative models. IEEE Trans Vis Comput Graph, 24(1):77–87. https://doi.org/10.1109/TVCG.2017.2744938
Liu SX, Cui WW, Wu YC, et al., 2014. A survey on information visualization: recent advances and challenges. Visual Comput, 30(12):1373–1393. https://doi.org/10.1007/s00371-013-0892-3
Liu SX, Andrienko G, Wu YC, et al., 2018. Steering data quality with visual analytics: the complexity challenge. Vis Inform, 2(4):191–197. https://doi.org/10.1016/j.visinf.2018.12.001
Liu ZC, Stasko J, Sullivan T, 2009. SellTrend: inter-attribute visual analysis of temporal transaction data. IEEE Trans Vis Comput Graph, 15(6):1025–1032. https://doi.org/10.1109/TVCG.2009.180
Luo XN, Yuan Y, Zhang KY, et al., 2019. Enhancing statistical charts: toward better data visualization and analysis. J Vis, 22(4):819–832. https://doi.org/10.1007/s12650-019-00569-2
Luu L, Saha R, Parameshwaran I, et al., 2015. On power splitting games in distributed computation: the case of Bitcoin pooled mining. Proc 28th Computer Security Foundations Symp, p. 397–411. https://doi.org/10.1109/CSF.2015.34
McGinn D, Birch D, Akroyd D, et al., 2016. Visualizing dynamic Bitcoin transaction patterns. Big Data, 4(2):109–119. https://doi.org/10.1089/big.2015.0056
Mei HH, Chen W, Wei YT, et al., 2019. Rsatree: distribution-aware data representation of large-scale tabular datasets for flexible visual query. https://arxiv.org/abs/1908.02005
Meiklejohn S, Orlandi C, 2015. Privacy-enhancing overlays in Bitcoin. Int Conf on Financial Cryptography and Data Security, p. 127–141. https://doi.org/10.1007/978-3-662-48051-9_10
Meiklejohn S, Pomarole M, Jordan G, et al., 2013. A fistful of Bitcoins: characterizing payments among men with no names. Proc Conf on Internet Measurement, p. 127–140. https://doi.org/10.1145/2504730.2504747
Moore T, Christin N, 2013. Beware the middleman: empirical analysis of Bitcoin-exchange risk. Proc 17th Int Conf on Financial Cryptography and Data Security, p. 25–33. https://doi.org/10.1007/978-3-642-39884-1_3
Möser M, Böhme R, Breuker D, 2013. An inquiry into money laundering tools in the Bitcoin ecosystem. Proc APWG eCrime Researchers Summit, p. 1–14. https://doi.org/10.1109/eCRS.2013.6805780
Nakamoto S, 2008. Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
Neudecker T, Hartenstein H, 2017. Could network information facilitate address clustering in Bitcoin? Proc Int Conf on Financial Cryptography and Data Security, p. 155–169. https://doi.org/10.1007/978-3-319-70278-0_9
Ober M, Katzenbeisser S, Hamacher K, 2013. Structure and anonymity of the Bitcoin transaction graph. Fut Int, 5(2):237–250. https://doi.org/10.3390/fi5020237
Ranshous S, Joslyn CA, Kreyling S, et al., 2017. Exchange pattern mining in the Bitcoin transaction directed hypergraph. Proc Int Conf on Financial Cryptography and Data Security, p. 248–263. https://doi.org/10.1007/978-3-319-70278-0_16
Ron D, Shamir A, 2013. Quantitative analysis of the full Bitcoin transaction graph. Proc Int Conf on Financial Cryptography and Data Security, p. 248–263. https://doi.org/10.1007/978-3-319-70278-0_16
Spagnuolo M, Maggi F, Zanero S, 2014. Bitiodine: extracting intelligence from the Bitcoin network. Proc 18th Int Conf on Financial Cryptography and Data Security, p. 457–468. https://doi.org/10.1007/978-3-662-45472-5_29
Vasek M, Moore T, 2015. There's no free lunch, even using Bitcoin: tracking the popularity and profits of virtual currency scams. Proc 19th Int Conf on Financial Cryptography and Data Security, p. 44–61. https://doi.org/10.1007/978-3-662-47854-7_4
Vasek M, Thornton M, Moore T, 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. Proc Int Conf on Financial Cryptography and Data Security, p. 57–71. https://doi.org/10.1007/978-3-662-44774-1_5
Wang LQ, Liu Y, 2015. Exploring miner evolution in Bitcoin network. Proc 16th Int Conf on Passive and Active Network Measurement, p. 290–302. https://doi.org/10.1007/978-3-319-15509-8_22
Wang X, Cui ZW, Jiang L, et al., 2020. WordleNet: a visualization approach for relationship exploration in document collection. Tsinghua Sci Technol, 25(3):384–400. https://doi.org/10.26599/TST.2019.9010005
Wang XM, Chou JK, Chen W, et al., 2018. A utility-aware visual approach for anonymizing multi-attribute tabular data. IEEE Trans Vis Comput Graph, 24(1):351–360. https://doi.org/10.1109/TVCG.2017.2745139
Wang XM, Chen W, Chou JK, et al., 2019. GraphProtector: a visual interface for employing and assessing multiple privacy preserving graph algorithms. IEEE Trans Vis Comput Graph, 25(1):193–203. https://doi.org/10.1109/TVCG.2018.2865021
Wei JS, Shen ZQ, Sundaresan N, et al., 2012. Visual cluster exploration of web clickstream data. Proc IEEE Conf on Visual Analytics Science and Technology, p. 3–12. https://doi.org/10.1109/VAST.2012.6400494
Wu YC, Xie X, Wang JC, et al., 2019. ForVizor: visualizing spatio-temporal team formations in soccer. IEEE Trans Vis Comput Graph, 25(1):65–75. https://doi.org/10.1109/TVCG.2018.2865041
Xia JZ, Ye FJ, Zhou FF, et al., 2019. Visual identification and extraction of intrinsic axes in high-dimensional data. IEEE Access, 7:79565–79578. https://doi.org/10.1109/ACCESS.2019.2922997
Xie C, Chen W, Huang XX, et al., 2014. VAET: a visual analytics approach for e-transactions time-series. IEEE Trans Vis Comput Graph, 20(12):1743–1752. https://doi.org/10.1109/TVCG.2014.2346913
Ying Z, Luo XB, Lin XR, et al., 2019. Visual analytics for electromagnetic situation awareness in radio monitoring and management. IEEE Trans Vis Comput Graph, 26(1):590–600. https://doi.org/10.1109/TVCG.2019.2934655
Yli-Huumo J, Ko D, Choi S, et al., 2016. Where is current research on blockchain technology?—a systematic review. PLoS ONE, 11(10):e0163477. https://doi.org/10.1371/journal.pone.0163477
Yue XW, Shu XH, Zhu XY, et al., 2019. Bitextract: interactive visualization for extracting Bitcoin exchange intelligence. IEEE Trans Vis Comput Graph, 25(1):162–171. https://doi.org/10.1109/TVCG.2018.2864814
Zeng W, Fu CW, Arisona SM, et al., 2017. A visual analytics design for studying rhythm patterns from human daily movement data. Vis Inform, 1(2):81–91. https://doi.org/10.1016/j.visinf.2017.07.001
Zhao Y, Luo F, Chen MH, et al., 2019. Evaluating multidimensional visualizations for understanding fuzzy clusters. IEEE Trans Vis Comput Graph, 25(1):12–21. https://doi.org/10.1109/TVCG.2018.2865020
Zhao Y, Wang L, Li SJ, et al., 2020. A visual analysis approach for understanding durability test data of automotive products. ACM Trans Intell Syst Technol, 10(6):1–23. https://doi.org/10.1145/3345640
Zhou FF, Lin XR, Liu C, et al., 2019. A survey of visualization for smart manufacturing. J Vis, 22(2):419–435. https://doi.org/10.1007/s12650-018-0530-2
Zhou ZG, Ye ZF, Liu YN, et al., 2017. Visual analytics for spatial clusters of air-quality data. IEEE Comput Graph Appl, 37(5):98–105. https://doi.org/10.1109/MCG.2017.3621228
Zhou ZG, Meng LH, Tang C, et al., 2019. Visual abstraction of large scale geospatial origin-destination movement data. IEEE Trans Vis Comput Graph, 25(1):43–53. https://doi.org/10.1109/TVCG.2018.2864503
Zhou ZG, Zhang XL, Guo ZY, et al., 2020. Visual abstraction and exploration of large-scale geographical social media data. Neurocomputing, 376:244-255. https://doi.org/10.1016/j.neucom.2019.10.072
Zhu MF, Chen W, Xia JZ, et al., 2019. Location2vec: a situation-aware representation for visual exploration of urban locations. IEEE Trans Intell Transp Syst, 20(10):3891–3990. https://doi.org/10.1109/TITS.2019.2901117
Author information
Authors and Affiliations
Contributions
Jia-zhi XIA designed the research. Jia-zhi XIA and Yu-hong ZHANG drafted the manuscript. Yu-hong ZHANG implemented the system. Hui YE and Guang JIANG processed the data. Ying ZHAO helped design the system. Cong XIE and Ying WANG helped organize the manuscript. Xiao-yan KUI, Sheng-hui LIAO, Wei-ping WANG, and Ying ZHAO revised the manuscript. Jia-zhi XIA and Yu-hong ZHANG finalized the paper.
Corresponding author
Additional information
Compliance with ethics guidelines
Jia-zhi XIA, Yu-Hong ZHANG, Hui YE, Ying WANG, Guang JIANG, Ying ZHAO, Cong XIE, Xiao-yan KUI, Sheng-hui LIAO, and Wei-ping WANG declare that they have no conflict of interest.
Project supported by the National Natural Science Foundation of China (Nos. 61872389, 61502540, 61672538, 61872388, and 61772556), the Natural Science Foundation of Hunan Province, China (Nos. 2015JJ4077, 2019JJ40406, and 2017JJ2330), the Changsha Science and Technology Plan Key Project, China (No. kq1801066), and the Fundamental Research Funds for the Central Universities of Central South University, China (No. 2018zzts065)
Rights and permissions
About this article
Cite this article
Xia, Jz., Zhang, Yh., Ye, H. et al. SuPoolVisor: a visual analytics system for mining pool surveillance. Front Inform Technol Electron Eng 21, 507–523 (2020). https://doi.org/10.1631/FITEE.1900532
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.1900532