Deep Blockchain Approach for Anomaly Detection in the Bitcoin Network
Keywords:
Anomaly Detection, Blockchain, Deep Learning, Fraud Detection, Unsupervised LearningAbstract
Long-term research has been done on anomaly detection. Its uses in the banking industry have made it easier to spot questionable hacker activity. However, it is more difficult to trick financial systems due to innovations in the financial sector like blockchain and artificial intelligence. Despite these technical developments, there have nevertheless been several instances of fraud. To address the anomaly detection issue, a variety of artificial intelligence algorithms have been put forth; while some findings seem to be remarkably encouraging, no clear victor has emerged. The transactional data of "Bitcoin," which is one of the public financial block chains, can be detected with the help of several anomaly detection algorithms. This paper makes a quantum leap toward bridging the gap between artificial intelligence and blockchain. In light of anomaly detection, this article also explains the importance of block chain technology and its use in the financial sector. Additionally, it pulls the bitcoin blockchain's transactional data and uses unsupervised machine learning algorithms to look for fraudulent transactions. Although various artificial intelligence algorithms have been proposed for anomaly detection, none have distinctly outperformed the rest. This paper delves into the intersection of artificial intelligence and blockchain, specifically focusing on the transactional data of Bitcoin, a leading public financial blockchain. We employ a range of unsupervised machine learning algorithms to identify potentially fraudulent transactions. A variety of techniques are assessed and contrasted, including isolation forest, cluster-based local outlier factor (CBLOF), deep autoencoder networks, and ensemble approaches service. This paper underscores the synergy of blockchain technology and anomaly detection in the realm of financial security, establishing a comprehensive perspective on modern approaches to fraud detection.
Downloads
References
Carlozo, Lou (2017). What is blockchain?" In: Journal of Accountancy 224.1, p. 29.
Nakamoto, Satoshi (2008). Bitcoin: A peer-to-peer electronic cash system". In: North-Denver-News (2015). Cybercrime- what are the costs to victims. url: http : / / northdenvernews.com/cybercrime-costs-victims (visited on 11/03/2018).
Saad, Muhammad & Spaulding, Jeffrey & Njilla, Laurent & Kamhoua, Charles & Shetty, Sachin & Nyang, Daehun & Mohaisen, David. (2020). Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Communications Surveys & Tutorials. PP. 1-1. 10.1109/COMST.2020.2975999.
Buczak, Anna & Guven, Erhan. (2015). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials. 18. 1-1. 10.1109/COMST.2015.2494502.
Usman, Muhammad & Ahmad Jan, Mian & He, Xiangjian & Chen, Jinjun. (2019). A Survey on Representation Learning Efforts in Cybersecurity Domain. ACM Computing Surveys. 52. 1-28. 10.1145/3331174.
Mahdavifar, Samaneh & Ghorbani, Ali. (2019). Application of Deep Learning to Cybersecurity: A Survey. Neurocomputing. 347. 10.1016/j.neucom.2019.02.056.
Chen, Weili & Zheng, Zibin & Ngai, Edith & Zheng, Peilin & Zhou, Yuren. (2019). Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum. IEEE Access. PP. 1-1. 10.1109/ACCESS.2019.2905769.
Ul Hassan, Muneeb & Rehmani, Mubashir Husain & Chen, Jinjun. (2019). DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading. IEEE Transactions on Services Computing. PP. 1-1. 10.1109/TSC.2019.2947471.
Zhang, Shijie & Lee, Jong-Hyouk. (2019). Double-Spending with a Sybil Attack in the Bitcoin Decentralized Network. IEEE Transactions on Industrial Informatics. 15. 5715 - 5722. 10.1109/TII.2019.2921566.
Farren, Derek, Thai Pham, and Marco Alban-Hidalgo (2016). Low Latency Anomaly Detection and Bayesian Network Prediction of Anomaly Likelihood". In: arXiv preprint arXiv:1611.03898.
Ide, Tsuyoshi. (2018). Collaborative Anomaly Detection on Blockchain from Noisy Sensor Data. 120-127. 10.1109/ICDMW.2018.00024.
Abu Musa, Tahani & Bouras, Abdelaziz. (2021). Anomaly Detection in Blockchain-enabled Supply Chain: An Ontological Approach. 169-169. 10.29117/quarfe.2021.0169.
Golomb, Tomer & Mirsky, Yisroel & Elovici, Yuval. (2018). CIoTA: Collaborative Anomaly Detection via Blockchain. 10.14722/diss.2018.23003.
Guarascio, Massimo & Liguori, Angelica & Manco, Giuseppe & Ritacco, Ettore & Scicchitano, Francesco. (2020). Deep Autoencoder Ensembles for Anomaly Detection on Blockchain. 10.1007/978-3-030-59491-6_43.
Ofori-Boateng, Dorcas & Segovia-Dominguez, Ignacio & Kantarcioglu, Murat & Akcora, Cuneyt & Gel, Yulia. (2021). Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.