Deep Blockchain Approach for Anomaly Detection in the Bitcoin Network

Authors

  • Swapna Siddamsetti S.D.M.College of Eng. &Tec1Department of Computer Science, GITAM School of Science, GITAM Deemed to be University, Vishakapatnam, and Assistant Professor, Department of Computer Science and Engineering, Neil Gogte Institute of Technology, Hyderabad, Telangana, India.
  • Muktevi Srivenkatesh Associate Professor, Department of Computer Science, GITAM School of Science, GITAM Deemed to be University, Vishakapatnam, India.

Keywords:

Anomaly Detection, Blockchain, Deep Learning, Fraud Detection, Unsupervised Learning

Abstract

Long-term research has been done on anomaly detection. Its uses in the banking industry have made it easier to spot questionable hacker activity. However, it is more difficult to trick financial systems due to innovations in the financial sector like blockchain and artificial intelligence. Despite these technical developments, there have nevertheless been several instances of fraud. To address the anomaly detection issue, a variety of artificial intelligence algorithms have been put forth; while some findings seem to be remarkably encouraging, no clear victor has emerged. The transactional data of "Bitcoin," which is one of the public financial block chains, can be detected with the help of several anomaly detection algorithms. This paper makes a quantum leap toward bridging the gap between artificial intelligence and blockchain. In light of anomaly detection, this article also explains the importance of block chain technology and its use in the financial sector. Additionally, it pulls the bitcoin blockchain's transactional data and uses unsupervised machine learning algorithms to look for fraudulent transactions. Although various artificial intelligence algorithms have been proposed for anomaly detection, none have distinctly outperformed the rest. This paper delves into the intersection of artificial intelligence and blockchain, specifically focusing on the transactional data of Bitcoin, a leading public financial blockchain. We employ a range of unsupervised machine learning algorithms to identify potentially fraudulent transactions. A variety of techniques are assessed and contrasted, including isolation forest, cluster-based local outlier factor (CBLOF), deep autoencoder networks, and ensemble approaches service. This paper underscores the synergy of blockchain technology and anomaly detection in the realm of financial security, establishing a comprehensive perspective on modern approaches to fraud detection.

Downloads

Download data is not yet available.

References

Carlozo, Lou (2017). What is blockchain?" In: Journal of Accountancy 224.1, p. 29.

Nakamoto, Satoshi (2008). Bitcoin: A peer-to-peer electronic cash system". In: North-Denver-News (2015). Cybercrime- what are the costs to victims. url: http : / / northdenvernews.com/cybercrime-costs-victims (visited on 11/03/2018).

Saad, Muhammad & Spaulding, Jeffrey & Njilla, Laurent & Kamhoua, Charles & Shetty, Sachin & Nyang, Daehun & Mohaisen, David. (2020). Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Communications Surveys & Tutorials. PP. 1-1. 10.1109/COMST.2020.2975999.

Buczak, Anna & Guven, Erhan. (2015). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials. 18. 1-1. 10.1109/COMST.2015.2494502.

Usman, Muhammad & Ahmad Jan, Mian & He, Xiangjian & Chen, Jinjun. (2019). A Survey on Representation Learning Efforts in Cybersecurity Domain. ACM Computing Surveys. 52. 1-28. 10.1145/3331174.

Mahdavifar, Samaneh & Ghorbani, Ali. (2019). Application of Deep Learning to Cybersecurity: A Survey. Neurocomputing. 347. 10.1016/j.neucom.2019.02.056.

Chen, Weili & Zheng, Zibin & Ngai, Edith & Zheng, Peilin & Zhou, Yuren. (2019). Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum. IEEE Access. PP. 1-1. 10.1109/ACCESS.2019.2905769.

Ul Hassan, Muneeb & Rehmani, Mubashir Husain & Chen, Jinjun. (2019). DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading. IEEE Transactions on Services Computing. PP. 1-1. 10.1109/TSC.2019.2947471.

Zhang, Shijie & Lee, Jong-Hyouk. (2019). Double-Spending with a Sybil Attack in the Bitcoin Decentralized Network. IEEE Transactions on Industrial Informatics. 15. 5715 - 5722. 10.1109/TII.2019.2921566.

Farren, Derek, Thai Pham, and Marco Alban-Hidalgo (2016). Low Latency Anomaly Detection and Bayesian Network Prediction of Anomaly Likelihood". In: arXiv preprint arXiv:1611.03898.

Ide, Tsuyoshi. (2018). Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data. 120-127. 10.1109/ICDMW.2018.00024.

Abu Musa, Tahani & Bouras, Abdelaziz. (2021). Anomaly Detection in Blockchain-enabled Supply Chain: An Ontological Approach. 169-169. 10.29117/quarfe.2021.0169.

Golomb, Tomer & Mirsky, Yisroel & Elovici, Yuval. (2018). CIoTA: Collaborative Anomaly Detection via Blockchain. 10.14722/diss.2018.23003.

Guarascio, Massimo & Liguori, Angelica & Manco, Giuseppe & Ritacco, Ettore & Scicchitano, Francesco. (2020). Deep Autoencoder Ensembles for Anomaly Detection on Blockchain. 10.1007/978-3-030-59491-6_43.

Ofori-Boateng, Dorcas & Segovia-Dominguez, Ignacio & Kantarcioglu, Murat & Akcora, Cuneyt & Gel, Yulia. (2021). Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks.

Downloads

Published

25.12.2023

How to Cite

Siddamsetti, S. ., & Srivenkatesh, M. . (2023). Deep Blockchain Approach for Anomaly Detection in the Bitcoin Network. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 581–595. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3956

Issue

Section

Research Article