Detecting malicious accounts in permissionless blockchains using temporal graph properties
Abstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2021-02-01
|
Series: | Applied Network Science |
Subjects: | |
Online Access: | https://doi.org/10.1007/s41109-020-00338-3 |
id |
doaj-7a2ea3a2675a426384d96d943363dffb |
---|---|
record_format |
Article |
spelling |
doaj-7a2ea3a2675a426384d96d943363dffb2021-02-14T12:26:12ZengSpringerOpenApplied Network Science2364-82282021-02-016113010.1007/s41109-020-00338-3Detecting malicious accounts in permissionless blockchains using temporal graph propertiesRachit Agarwal0Shikhar Barve1Sandeep Kumar Shukla2Computer Science Department, IIT KanpurComputer Science Department, IIT KanpurComputer Science Department, IIT KanpurAbstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset—the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.https://doi.org/10.1007/s41109-020-00338-3BlockchainMachine LearningTemporal graphsBehavior analysisEthereumSuspect identification |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rachit Agarwal Shikhar Barve Sandeep Kumar Shukla |
spellingShingle |
Rachit Agarwal Shikhar Barve Sandeep Kumar Shukla Detecting malicious accounts in permissionless blockchains using temporal graph properties Applied Network Science Blockchain Machine Learning Temporal graphs Behavior analysis Ethereum Suspect identification |
author_facet |
Rachit Agarwal Shikhar Barve Sandeep Kumar Shukla |
author_sort |
Rachit Agarwal |
title |
Detecting malicious accounts in permissionless blockchains using temporal graph properties |
title_short |
Detecting malicious accounts in permissionless blockchains using temporal graph properties |
title_full |
Detecting malicious accounts in permissionless blockchains using temporal graph properties |
title_fullStr |
Detecting malicious accounts in permissionless blockchains using temporal graph properties |
title_full_unstemmed |
Detecting malicious accounts in permissionless blockchains using temporal graph properties |
title_sort |
detecting malicious accounts in permissionless blockchains using temporal graph properties |
publisher |
SpringerOpen |
series |
Applied Network Science |
issn |
2364-8228 |
publishDate |
2021-02-01 |
description |
Abstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset—the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities. |
topic |
Blockchain Machine Learning Temporal graphs Behavior analysis Ethereum Suspect identification |
url |
https://doi.org/10.1007/s41109-020-00338-3 |
work_keys_str_mv |
AT rachitagarwal detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties AT shikharbarve detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties AT sandeepkumarshukla detectingmaliciousaccountsinpermissionlessblockchainsusingtemporalgraphproperties |
_version_ |
1724270537277964288 |