The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art techniques for detecting malicious actors depend on the transactional behavior of individual wallet addresses but do not analyze the money trails. We propose a heuristics-based approach that adds new features associated with money trails to analyze and find suspicious activities in cryptocurrency blockchains. Here, we focus only on the cyclic behavior and identify hidden patterns present in the temporal transactions graphs in a blockchain. We demonstrate our methods on the transaction data of the Ethereum blockchain. We find that malicious activities (such as Gambling, Phishing, and Money Laundering) have different cyclic patterns in Ethereum. We also identify two suspicious temporal cyclic path-based transfers in Ethereum. Our techniques may apply to other cryptocurrency blockchains with appropriate modifications adapted to the nature of the crypto-currency under investigation.
翻译:分散化、冗余和假匿名等特征使无许可的公共链锁平台具有吸引力,可以用作隐秘的技术性平台,但这种采用使网络犯罪分子能够利用链锁平台的脆弱性,并通过社会工程针对用户开展恶意活动。发现恶意行为者的最先进技术大多取决于个人钱包地址的交易行为,但并不分析资金流向。我们提议采用基于超自然的方法,增加与货币线索相关的新特征,以分析和发现隐秘货币链中的可疑活动。在这里,我们只注重循环行为,并查明在链条中时间交易图中存在的隐蔽模式。我们展示了我们在Ethereum链交易数据上采用的方法。我们发现Eveyerum的恶意活动(如赌博、钓鱼和洗钱)有不同的循环模式。我们还在Etheuum发现了两种可疑的基于时间周期路径的转移。我们的技术可能适用于其他隐蔽货币链,并适当修改到调查中的货币交易性质。