Detecting malicious accounts in permissionless blockchains using temporal graph properties

Abstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious...

Full description

Bibliographic Details
Main Authors: Rachit Agarwal, Shikhar Barve, Sandeep Kumar Shukla
Format: Article
Language:English
Published: SpringerOpen 2021-02-01
Series:Applied Network Science
Subjects:
Online Access:https://doi.org/10.1007/s41109-020-00338-3
id doaj-7a2ea3a2675a426384d96d943363dffb
record_format Article
spelling doaj-7a2ea3a2675a426384d96d943363dffb2021-02-14T12:26:12ZengSpringerOpenApplied Network Science2364-82282021-02-016113010.1007/s41109-020-00338-3Detecting malicious accounts in permissionless blockchains using temporal graph propertiesRachit Agarwal0Shikhar Barve1Sandeep Kumar Shukla2Computer Science Department, IIT KanpurComputer Science Department, IIT KanpurComputer Science Department, IIT KanpurAbstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset—the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.https://doi.org/10.1007/s41109-020-00338-3BlockchainMachine LearningTemporal graphsBehavior analysisEthereumSuspect identification
collection DOAJ
language English
format Article
sources DOAJ
author Rachit Agarwal
Shikhar Barve
Sandeep Kumar Shukla
spellingShingle Rachit Agarwal
Shikhar Barve
Sandeep Kumar Shukla
Detecting malicious accounts in permissionless blockchains using temporal graph properties
Applied Network Science
Blockchain
Machine Learning
Temporal graphs
Behavior analysis
Ethereum
Suspect identification
author_facet Rachit Agarwal
Shikhar Barve
Sandeep Kumar Shukla
author_sort Rachit Agarwal
title Detecting malicious accounts in permissionless blockchains using temporal graph properties
title_short Detecting malicious accounts in permissionless blockchains using temporal graph properties
title_full Detecting malicious accounts in permissionless blockchains using temporal graph properties
title_fullStr Detecting malicious accounts in permissionless blockchains using temporal graph properties
title_full_unstemmed Detecting malicious accounts in permissionless blockchains using temporal graph properties
title_sort detecting malicious accounts in permissionless blockchains using temporal graph properties
publisher SpringerOpen
series Applied Network Science
issn 2364-8228
publishDate 2021-02-01
description Abstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset—the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.
topic Blockchain
Machine Learning
Temporal graphs
Behavior analysis
Ethereum
Suspect identification
url https://doi.org/10.1007/s41109-020-00338-3
work_keys_str_mv AT rachitagarwal detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties
AT shikharbarve detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties
AT sandeepkumarshukla detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties
_version_ 1724270537277964288