2018
DOI: 10.1108/jfc-12-2016-0078
|View full text |Cite
|
Sign up to set email alerts
|

Bitcoin transactions: a digital discovery of illicit activity on the blockchain

Abstract: Purpose The purpose of this paper is to determine if Bitcoin transactions could be de-anonymised by analysing the Bitcoin blockchain and transactions conducted through the blockchain. In addition, graph analysis and the use of modern social media technology were examined to determine how they may help reveal the identity of Bitcoin users. A review of machine learning techniques and heuristics was carried out to learn how certain behaviours from the Bitcoin network could be augmented with social media technolog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(41 citation statements)
references
References 5 publications
0
40
0
1
Order By: Relevance
“…There are few notable differences between bitcoin mainnet and testnet which are summarized in table 3. For capturing Bitcoin packets, we used network protocol analyzer called Wireshark [9,10].Wireshark allowed us to visualize messages exchanged between peers and thus served as an invaluable tool to deeply investigate about the Bitcoin protocol contents. We used [11] website to recieve some free coins and then transfer some coins back to it and record the whole process for investigation with Wireshark.…”
Section: Methodsmentioning
confidence: 99%
“…There are few notable differences between bitcoin mainnet and testnet which are summarized in table 3. For capturing Bitcoin packets, we used network protocol analyzer called Wireshark [9,10].Wireshark allowed us to visualize messages exchanged between peers and thus served as an invaluable tool to deeply investigate about the Bitcoin protocol contents. We used [11] website to recieve some free coins and then transfer some coins back to it and record the whole process for investigation with Wireshark.…”
Section: Methodsmentioning
confidence: 99%
“…To address the problem of anonymity and untraceable nature of cryptocurrency transactions, Turner and Irwin (2018) made an attempt to de-anonymise Bitcoin transactions using a variety of software tools. The authors found that while it was possible to follow a transaction across the blockchain, the anonymity feature inherent in the system was not overcome.…”
Section: New Opportunities For Money Launderingmentioning
confidence: 99%
“…Since then researchers have investigated both machine-learning and traditional statistical approaches to detect money laundering (Irwin et al, 2012, Bidabad, 2017, Chang et al, 2008, Deng et al, 2009, Drezewski et al, 2012, Colladon and Remondi, 2017, Gilmour, 2017, Ju and Zheng, 2009, Ngai et al, 2011, Perols, 2011, Regan et al, 2017, Savage et al, 2016, Savage, 2017, Turner and Irwin, 2018, Unger et al, 2011, Wang et al, 2007, Zdanowicz, 2004a, Zdanowicz, 2009, Zhang et al, 2003, Gao, 2009). Zhang et al authors on using the system on real-world data found it was able to detect suspicious activity with a low rate of false positives.…”
Section: Detection Of Money Launderingmentioning
confidence: 99%
“…To de-anonymize users on the Bitcoin network, Turner and Irwin (2018) look at the openness of the Bitcoin system and some of the defining features seen within the anatomy of a Bitcoin transaction coupled with extensive data collection from packet sniffing software. Using network traffic analyzer tools, such as Wireshark, can capture Bitcoin protocol traffic by listening on the network to port 8333 and building a profile of transaction flow between IP addresses and Bitcoin addresses over time.…”
Section: Analyzing the Network Layermentioning
confidence: 99%
“…Due to the peer-to-peer propagation of transactions any observation of an IP address where a transaction is intercepted may not be the original creator of the transaction. This further removes any ability to reveal identity via Bitcoin address usage analysis on the network (Turner and Irwin, 2018). Furthermore, Irwin and Turner (2018), highlight the lack of reliability in this analysis approach and the inhibitors of revealing any illicit transaction.…”
Section: Analyzing the Network Layermentioning
confidence: 99%