Analyzing Hack Subnetworks in the Bitcoin Transaction Graph
Autor: | Yonah Shmalo, Daniel Goldsmith, Kim Grauer |
---|---|
Rok vydání: | 2019 |
Předmět: |
FOS: Computer and information sciences
Cryptocurrency Physics - Physics and Society Computer Science - Cryptography and Security Computer Networks and Communications Computer science media_common.quotation_subject Complex networks FOS: Physical sciences 02 engineering and technology Physics and Society (physics.soc-ph) Computer security computer.software_genre 03 medical and health sciences Crytocurrency Node (computer science) 0202 electrical engineering electronic engineering information engineering 030304 developmental biology Hacker media_common 0303 health sciences Multidisciplinary Cybercrime lcsh:T57-57.97 Computational Mathematics Cash lcsh:Applied mathematics. Quantitative methods Key (cryptography) Graph (abstract data type) 020201 artificial intelligence & image processing Network analysis In degree Hacks Database transaction computer Cryptography and Security (cs.CR) Bitcoin |
Zdroj: | Applied Network Science, Vol 5, Iss 1, Pp 1-20 (2020) |
DOI: | 10.48550/arxiv.1910.13415 |
Popis: | Hacks are one of the most damaging types of cryptocurrency related crime, accounting for billions of dollars in stolen funds since 2009. Professional investigators at Chainalysis have traced these stolen funds from the initial breach on an exchange to off-ramps, i.e. services where criminals are able to convert the stolen funds into fiat or other cryptocurrencies. We analyzed six hack subnetworks of bitcoin transactions known to belong to two prominent hacking groups. We analyze each hack according to eight network features, both static and temporal, and successfully classify each hack to its respective hacking group through our newly proposed method. We find that the static features, such as node balance, in degree, and out degree are not as useful in classifying the hacks into hacking groups as temporal features related to how quickly the criminals cash out. We validate our operating hypothesis that the key distinction between the two hacking groups is the acceleration with which the funds exit through terminal nodes in the subnetworks. Comment: 19 pages, 11 figures |
Databáze: | OpenAIRE |
Externí odkaz: |