EGRET : extortion graph exploration techniques in the Bitcoin network

The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be in...

全面介紹

Saved in:
書目詳細資料
Main Authors: Phetsouvanh, Silivanxay, Oggier, Frédérique, Datta, Anwitaman
其他作者: School of Computer Science and Engineering
格式: Conference or Workshop Item
語言:English
出版: 2019
主題:
在線閱讀:https://hdl.handle.net/10356/88894
http://hdl.handle.net/10220/49145
https://doi.org/10.21979/N9/FHBR2E
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
id sg-ntu-dr.10356-88894
record_format dspace
spelling sg-ntu-dr.10356-888942023-02-28T19:17:38Z EGRET : extortion graph exploration techniques in the Bitcoin network Phetsouvanh, Silivanxay Oggier, Frédérique Datta, Anwitaman School of Computer Science and Engineering School of Physical and Mathematical Sciences Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW) Bitcoin Forensics Graph Analysis DRNTU::Engineering::Computer science and engineering The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be involved in a given extortion racket, exploiting the anonymity of the Bitcoin network to collect and launder money. Starting around Bitcoin addresses of potential interest, neighborhood subgraphs are analyzed in terms of path length and confluence to detect suspicious Bitcoin flow and other wallet addresses controlled by the suspected perpetrators. We show with a dataset of the Ashley Madison blackmail campaign from August 2015 how the mechanisms can be used both to estimate the amount of money that was extorted by the suspected perpetrators under the specific blackmail campaign, and also estimate the amount of money handled by them during the same period of time. Accepted version 2019-07-05T02:40:45Z 2019-12-06T17:13:14Z 2019-07-05T02:40:45Z 2019-12-06T17:13:14Z 2018-11-01 2018 Conference Paper Phetsouvanh, S., Oggier, F., & Datta, A. (2018). EGRET : extortion graph exploration techniques in the Bitcoin network. Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW). doi:10.1109/ICDMW.2018.00043 https://hdl.handle.net/10356/88894 http://hdl.handle.net/10220/49145 10.1109/ICDMW.2018.00043 208885 en https://doi.org/10.21979/N9/FHBR2E © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICDMW.2018.00043 8 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Bitcoin Forensics
Graph Analysis
DRNTU::Engineering::Computer science and engineering
spellingShingle Bitcoin Forensics
Graph Analysis
DRNTU::Engineering::Computer science and engineering
Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
EGRET : extortion graph exploration techniques in the Bitcoin network
description The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be involved in a given extortion racket, exploiting the anonymity of the Bitcoin network to collect and launder money. Starting around Bitcoin addresses of potential interest, neighborhood subgraphs are analyzed in terms of path length and confluence to detect suspicious Bitcoin flow and other wallet addresses controlled by the suspected perpetrators. We show with a dataset of the Ashley Madison blackmail campaign from August 2015 how the mechanisms can be used both to estimate the amount of money that was extorted by the suspected perpetrators under the specific blackmail campaign, and also estimate the amount of money handled by them during the same period of time.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
format Conference or Workshop Item
author Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
author_sort Phetsouvanh, Silivanxay
title EGRET : extortion graph exploration techniques in the Bitcoin network
title_short EGRET : extortion graph exploration techniques in the Bitcoin network
title_full EGRET : extortion graph exploration techniques in the Bitcoin network
title_fullStr EGRET : extortion graph exploration techniques in the Bitcoin network
title_full_unstemmed EGRET : extortion graph exploration techniques in the Bitcoin network
title_sort egret : extortion graph exploration techniques in the bitcoin network
publishDate 2019
url https://hdl.handle.net/10356/88894
http://hdl.handle.net/10220/49145
https://doi.org/10.21979/N9/FHBR2E
_version_ 1759855797151465472