Heuristic Approaches Based Clustering of Bitcoin Addresses

被引:0
|
作者
Mao H.-L. [1 ]
Wu Z. [1 ]
He M. [1 ]
Tang J.-Q. [1 ]
Shen M. [2 ]
机构
[1] National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing
[2] Department of Computer Science, Beijing Institute of Technology, Beijing
关键词
Bitcoin; Cluster; Heuristic;
D O I
10.13190/j.jbupt.2017-237
中图分类号
学科分类号
摘要
Because of anonymity of Bitcoin accounts, Bitcoin may be popular in some illegal trades and black market, such as the Silk Road.The author proposed an improved heuristic approaches-based method to cluster Bitcoin addresses and identify different addresses controlled by the same user. Three heuristic evidences were employed jointly. Through an elaborately designed experimental analysis, the precision and recall of the proposed method was verified. Furthermore, the efficiency with different iterations was analyzed, which can provide guidance in designing efficient clustering algorithm. © 2018, Editorial Department of Journal of Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:27 / 31
页数:4
相关论文
共 9 条
  • [1] Man H.A., Liu J.K., Fang J., Et al., A new payment system for enhancing location privacy of electric vehicles, IEEE Transactions on Vehicular Technology, 63, 1, pp. 3-18, (2014)
  • [2] Reid F., Harrigan M., An analysis of anonymity in the Bitcoin system, IEEE Third International Conference on Privacy, Security, Risk and Trust, pp. 1318-1326, (2011)
  • [3] Meiklejohn S., Pomarole M., Jordan G., Et al., A fistful of Bitcoins: characterizing payments among men with no names, Communications of the ACM, 59, 4, pp. 86-93, (2016)
  • [4] Androulaki E., Karame G.O., Roeschlin M., Et al., Evaluating user privacy in Bitcoin, International Conference on Financial Cryptography and Data Security, pp. 34-51, (2013)
  • [5] Monaco J.V., Identifying Bitcoin users by transaction behavior, Proc SPIE, 9457, pp. 1-15, (2015)
  • [6] Liao K., Zhao Z., Doupe A., Et al., Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin, APWG Symposium on Electronic Crime Research, pp. 1-13, (2016)
  • [7] Ron D., Shamir A., Quantitative analysis of the full Bitcoin transaction graph, International Conference on Financial Cryptography and Data Security, pp. 6-24, (2013)
  • [8] Huang B., Liu Z., Chen J., Et al., Behavior pattern clustering in blockchain networks, Multimedia Tools & Applications, 76, 19, pp. 20099-20110, (2017)
  • [9] Spagnuolo M., Maggi F., Zanero S., BitIodine: extracting intelligence from the Bitcoin network, International Conference on Financial Cryptography and Data Security, pp. 457-468, (2014)