EGRET : extortion graph exploration techniques in the Bitcoin network

The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be in...

Full description

Saved in:
Bibliographic Details
Main Authors: Phetsouvanh, Silivanxay, Oggier, Frédérique, Datta, Anwitaman
Other Authors: School of Computer Science and Engineering
Format: Conference or Workshop Item
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/88894
http://hdl.handle.net/10220/49145
https://doi.org/10.21979/N9/FHBR2E
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-88894
record_format dspace
spelling sg-ntu-dr.10356-888942023-02-28T19:17:38Z EGRET : extortion graph exploration techniques in the Bitcoin network Phetsouvanh, Silivanxay Oggier, Frédérique Datta, Anwitaman School of Computer Science and Engineering School of Physical and Mathematical Sciences Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW) Bitcoin Forensics Graph Analysis DRNTU::Engineering::Computer science and engineering The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be involved in a given extortion racket, exploiting the anonymity of the Bitcoin network to collect and launder money. Starting around Bitcoin addresses of potential interest, neighborhood subgraphs are analyzed in terms of path length and confluence to detect suspicious Bitcoin flow and other wallet addresses controlled by the suspected perpetrators. We show with a dataset of the Ashley Madison blackmail campaign from August 2015 how the mechanisms can be used both to estimate the amount of money that was extorted by the suspected perpetrators under the specific blackmail campaign, and also estimate the amount of money handled by them during the same period of time. Accepted version 2019-07-05T02:40:45Z 2019-12-06T17:13:14Z 2019-07-05T02:40:45Z 2019-12-06T17:13:14Z 2018-11-01 2018 Conference Paper Phetsouvanh, S., Oggier, F., & Datta, A. (2018). EGRET : extortion graph exploration techniques in the Bitcoin network. Proceedings of 2018 IEEE International Conference on Data Mining Workshops (ICDMW). doi:10.1109/ICDMW.2018.00043 https://hdl.handle.net/10356/88894 http://hdl.handle.net/10220/49145 10.1109/ICDMW.2018.00043 208885 en https://doi.org/10.21979/N9/FHBR2E © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ICDMW.2018.00043 8 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Bitcoin Forensics
Graph Analysis
DRNTU::Engineering::Computer science and engineering
spellingShingle Bitcoin Forensics
Graph Analysis
DRNTU::Engineering::Computer science and engineering
Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
EGRET : extortion graph exploration techniques in the Bitcoin network
description The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships among wallet addresses (pseudonyms for Bitcoin users) suspected to be involved in a given extortion racket, exploiting the anonymity of the Bitcoin network to collect and launder money. Starting around Bitcoin addresses of potential interest, neighborhood subgraphs are analyzed in terms of path length and confluence to detect suspicious Bitcoin flow and other wallet addresses controlled by the suspected perpetrators. We show with a dataset of the Ashley Madison blackmail campaign from August 2015 how the mechanisms can be used both to estimate the amount of money that was extorted by the suspected perpetrators under the specific blackmail campaign, and also estimate the amount of money handled by them during the same period of time.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
format Conference or Workshop Item
author Phetsouvanh, Silivanxay
Oggier, Frédérique
Datta, Anwitaman
author_sort Phetsouvanh, Silivanxay
title EGRET : extortion graph exploration techniques in the Bitcoin network
title_short EGRET : extortion graph exploration techniques in the Bitcoin network
title_full EGRET : extortion graph exploration techniques in the Bitcoin network
title_fullStr EGRET : extortion graph exploration techniques in the Bitcoin network
title_full_unstemmed EGRET : extortion graph exploration techniques in the Bitcoin network
title_sort egret : extortion graph exploration techniques in the bitcoin network
publishDate 2019
url https://hdl.handle.net/10356/88894
http://hdl.handle.net/10220/49145
https://doi.org/10.21979/N9/FHBR2E
_version_ 1759855797151465472