ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article CENSor: Detecting Illicit Bitcoin Operation via GCN-Based Hyperedge Classification
Cited 1 time in scopus Download 47 time Share share facebook twitter linkedin kakaostory
Authors
Suyeol Lee, Jaehan Kim, Minjae Seo, Seung Ho Na, Seungwon Shin, Jinwoo Kim
Issue Date
2024-10
Citation
IEEE Access, v.12, pp.152330-152346
ISSN
2169-3536
Publisher
Institute of Electrical and Electronics Engineers Inc.
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1109/ACCESS.2024.3466650
Abstract
Cryptocurrencies have increasingly been used as a medium for illicit financial activities by criminals. Annually, billions of dollars' worth of Bitcoin penetrate cryptocurrency exchanges. Despite the critical need for advanced Bitcoin financial forensics to investigate these criminal activities, no novel methods have been developed to detect illicit Bitcoin operations. Existing approaches to identifying illegal Bitcoin activity are limited due to their inadequate consideration of graph data. To address these limitations, we present a novel approach, Hyperedge Classification, to detect illegal transactions with greater precision. This approach introduces a novel cluster-based Hyperedge-Node Switching technique, which enables effective hyperedge classification and visualization of hyperedge relationships. Additionally, we propose a framework named CENSor (Cluster-based Edge Node Switching Detector), which offers more powerful and robust detection capabilities compared to traditional techniques for both illegal entity detection and illegal transaction detection. Our cluster-based Hyperedge-Node Switching technique demonstrates its effectiveness with an F1-score of 0.867, outperforming comparative baselines. Moreover, CENSor visualizes the Bitcoin cluster graph and the Hyperedge-Node switched graph, highlighting the importance of utilizing appropriate graph information in Bitcoin analysis. Finally, we demonstrate that CENSor is resilient to an adversarial attack aimed at evading detection.
KSP Keywords
Cluster graph, Criminal Activities, Entity detection, Existing Approaches, F1-score, Graph data, Novel approach, Switching technique, Traditional Techniques, cluster-based, need for
This work is distributed under the term of Creative Commons License (CCL)
(CC BY NC ND)
CC BY NC ND