Skip to main content
Log in

CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation

  • Soft computing in decision making and in modeling in economics
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the rapid advances in computing and networking technologies, there have led to the creation of a novel and booming set of payment services, known as cryptocurrencies or digital tokens. Many are available for exchanges worldwide, inviting investors to trade with costs, quality, and safety that vary widely. Nevertheless, Blockchain transaction data have complex time and space dependencies, and historical transaction data reflect the transaction trends of cryptocurrencies to a certain extent, thus identifying the illegal behaviors of transactions such as money laundering more at the earliest. In this article, we propose a novel cryptocurrency abnormal transaction detection method with spatio-temporal and global representation, namely CTDM. CTDM combines EvolveGCN with MGU and global representations to achieve better performance. In addition, CTDM needs fewer learning parameters through MGU, which leads to less training time. Experimental results show that the proposed CTDM method outperforms SOTA Blockchain abnormal transaction detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

All experiments in this article are based on publicly available datasets: The Elliptic dataset (Weber et al. 2019) and the Bitcoin OTC dataset.

References

  • Alarab I, Prakoonwit S, Nacer MI (2020) Competence of graph convolutional networks for anti-money laundering in bitcoin blockchain. In: Proceedings of the 2020 5th international conference on machine learning technologies, pp 23–27

  • Ashour AS, El-Attar A, Dey N, Abd El-Kader H, Abd El-Naby MM (2020) Long short term memory based patient-dependent model for fog detection in Parkinson’s disease. Pattern Recognit Lett 131:23–29

    Article  Google Scholar 

  • Attia O, Khoufi I., Laouiti A, Adjih C (2019) An iot-blockchain architecture based on hyperledger framework for health care monitoring application. In: NTMS 2019-10th IFIP international conference on new technologies, mobility and security. IEEE Computer Society, pp 1–5

  • Cai S, Han D, Yin X, Li D, Chang C-C (2022a) A hybrid parallel deep learning model for efficient intrusion detection based on metric learning. Connect Sci 34:551–577

  • Cai S, Han D, Li D, Zheng Z, Crespi N (2022b) An reinforcement learning-based speech censorship chatbot system. J Supercomput, 78:8751–8773

  • Chen X, Liang W et al (2017) An efficient service recommendation algorithm for cyber-physical-social systems. Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2021.3092204

    Article  Google Scholar 

  • Cai S, Han D, Li D (2023) A feedback semi-supervised learning with meta-gradient for intrusion detection. IEEE Syst J 17:1158–1169

    Article  Google Scholar 

  • Cheng Z, Hou X, Li R, Zhou Y, Luo X, Li J, Ren K (2019) Towards a first step to understand the cryptocurrency stealing attack on ethereum. In: 22nd international symposium on research in attacks, intrusions and defenses (RAID 2019), pp 47–60

  • Diao C, Zhang D et al (2022) A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2022.3140229

    Article  Google Scholar 

  • Feng F, Yang E et al (2023) A novel oversampling and feature selection hybrid algorithm for imbalanced data classification. Multimed Tools Appl 82(3):3231–3267. https://doi.org/10.1007/s11042-022-13240-0

    Article  Google Scholar 

  • Fu J, Cao B, Wang X, Zeng P, Liang W, Liu Y (2022) BFS: a blockchain-based financing scheme for logistics company in supply chain finance. Connect Sci 34(1):1929–1955

    Article  Google Scholar 

  • Gao N, Han D, Weng T-H, Xia B, Li D, Castiglione A, Li K-C (2022) Modeling and analysis of port supply chain system based on fabric blockchain. Comput Ind Eng 172:108527

    Article  Google Scholar 

  • Gao H, Ji S (2019) Graph u-nets. In: International conference on machine learning, PMLR, pp 2083–2092

  • Gao C, Zhu J, Zhang F, Wang Z, Li X (2022) A novel representation learning for dynamic graphs based on graph convolutional networks. IEEE Trans Cybern

  • Goyal P, Chhetri SR, Canedo A (2020) dyngraph2vec: Capturing network dynamics using dynamic graph representation learning. Knowl-Based Syst 187:104816

    Article  Google Scholar 

  • Grachev AM, Ignatov DI, Savchenko AV (2019) Compression of recurrent neural networks for efficient language modeling. Appl Soft Comput 79:354–362

    Article  Google Scholar 

  • Hu N, Zhang D, Xie K et al (2022) Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction. J Syst Archit. https://doi.org/10.1016/j.sysarc.2022.102775

    Article  Google Scholar 

  • James J, Hawthorne D, Duncan K, Leger ASt, Sagisi J, Collins (2019) An experimental framework for investigating hashgraph algorithm transaction speed. In: Proceedings of the 2nd workshop on blockchain-enabled networked sensor, pp 15–21

  • Jullum M, Løland A, Huseby RB, Ånonsen G, Lorentzen J (2020) Detecting money laundering transactions with machine learning. J Money Laund Control 23(1):173–186

  • Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907

  • Li M, Han D, Yin X, Liu H, Li D (2021) Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features. Secur Commun Netw 2021:1–15

    Google Scholar 

  • Li D, Han D, Xia B, Weng T-H, Castiglione A, Li K-C (2022) Fabric-GC: a blockchain-based Gantt chart system for cross-organizational project management. Comput Sci Inf Syst 00:24–24

    Google Scholar 

  • Li J, Han D et al (2022) A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2022.12.037

    Article  Google Scholar 

  • Li D, Han D et al (2022) Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Comput 26(9):4423–4440

    Article  Google Scholar 

  • Li D, Han D et al (2022) MOOCschain: a blockchain-based secure storage and sharing scheme for MOOCs learning. Comput Stand Interfaces 81:103597

    Article  Google Scholar 

  • Liang W, Xiao L, Zhang K, Tang M, He D, Li K (2021) Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J 9:14741–14751

    Article  Google Scholar 

  • Liang W, Li Y, Xie K et al (2022) Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Tran Intell Transp Syst. https://doi.org/10.1109/TITS.2022.3156266

    Article  Google Scholar 

  • Liang W,Yang Y (2020) Pdpchain: a consortium blockchain-based privacy protection scheme for personal data. IEEE Trans Reliab. https://doi.org/10.1109/TR.2022.3190932

  • Liang W, Yang Y, Yang C, Hu Y, Xie S, Li K-C, Cao J (2022) Pdpchain: a consortium blockchain-based privacy protection scheme for personal data. IEEE Trans Reliab

  • Li Y, Cai Y, Tian H, Xue G, Zheng Z (2020) Identifying illicit addresses in bitcoin network. In: International conference on blockchain and trustworthy systems, Springer, pp 99–111

  • Li X, Cao X, Qiu X, Zhao J, Zheng J (2017) Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In: Fifth international conference on advanced cloud and big data (CBD). IEEE, pp 176–181

  • Li D,Han D, Liu H (2020) Fabric-chain & chain: a blockchain-based electronic document system for supply chain finance. In: International conference on blockchain and trustworthy systems

  • Li D, Han D, Zheng Z, Weng T, Li K, Li M, Cai S (2023) Does short-and-distort scheme really exist? a bitcoin futures audit scheme through birch and bpnn approach. Comput Econ 1–23

  • Liu H, Han D et al (2023) IdenMultiSig: identity-based decentralized multisignature in internet of things. IEEE Transactions on Computational Social Systems. https://doi.org/10.1109/TCSS.2022.3232173

  • Liu Y, Wang X, She X, Yi M, Li Y, Jiang F (2021) Design of intelligent mosquito nets based on deep learning algorithms. Comput Mater Contin 69(2):2261–2276

    Google Scholar 

  • Lorenz J, Silva MI, Aparício D, Ascensão JT, Bizarro P (2020) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the first ACM international conference on AI in finance, pp 1–8

  • Lv X, Han D, Li D, Xiao L, Chang CC (2022) Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder. EURASIP J Wirel Commun Netw 2022:1–21

    Article  Google Scholar 

  • Monamo PM, Marivate V, Twala B (2016) A multifaceted approach to bitcoin fraud detection: global and local outliers. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA), IEEE, pp 188–194

  • Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus Rev, p 21260

  • Oh B, Jun TJ, Yoon W, Lee Y, Kim S, Kim D (2019) Enhancing trust of supply chain using blockchain platform with robust data model and verification mechanisms. In: 2019 IEEE international conference on systems, man and cybernetics (SMC), IEEE, pp 3504–3511

  • Pareja A, Domeniconi G, Chen J, Ma T, Suzumura T, Kanezashi H, Kaler T, Schardl T, Leiserson C (2020) Evolvegcn: evolving graph convolutional networks for dynamic graphs. In: Proceedings of the AAAI conference on artificial intelligence, vol 34(04). pp 5363–5370

  • Qian W, Shao Q, Zhu Y, Jin C, Zhou A (2018) Research problems and methods in blockchain and trusted data management. J Softw 29(1):150–159

  • Ren K, Zheng T, Qin Z, Liu X (2020) Adversarial attacks and defenses in deep learning. Engineering 6(3):346–360

    Article  Google Scholar 

  • Roy PK, Tripathy AK et al (2023) Securing social platform from misinformation using deep learning. Comput Stand Interfaces 84:103674

    Article  Google Scholar 

  • Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Networks 20(1):61–80

    Article  Google Scholar 

  • Sun X, Yang T, Hu B (2022) LSTM-TC: Bitcoin coin mixing detection method with a high recall. Appl Intell 52(1):780–793

    Article  Google Scholar 

  • Sun Z, Han D, Li D, Wang X, Chang CC, Wu Z (2022) A blockchain-based secure storage scheme for medical information. EURASIP J Wirel Commun Netw 2022:1–25

    Article  Google Scholar 

  • Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591,

  • Wood KP (2014) Anti-money laundering in banking an enterprise-wide risk approach. Ph.D. dissertation, Utica College,

  • Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Tran Syst Man Cybern Syst 52(2020):1156–1166

    Google Scholar 

  • Wu J, Liu J, Zhao Y, Zheng Z (2021) Analysis of cryptocurrency transactions from a network perspective: an overview. J Netw Comput Appl 190:103139

    Article  Google Scholar 

  • Wu J, Liu J, Chen W, Huang H, Zheng Z, Zhang Y (2021) Detecting mixing services via mining bitcoin transaction network with hybrid motifs. IEEE Trans Syst Man Cybern Syst 52(2021):2237–2249

    Google Scholar 

  • Wu S, Wang D, He J, Zhou Y, Wu L, Yuan X, He Q, Ren K (2021) Defiranger: detecting price manipulation attacks on defi applications. arXiv preprint arXiv:2104.15068

  • Xu Z, Liang W et al (2022) A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Trans Ind Inform 18(10):7118–7127. https://doi.org/10.1109/TII.2021.3129631

    Article  Google Scholar 

  • Yang Z, Mourshed M, Liu K, Xu X, Feng S (2020) A novel competitive swarm optimized RBF neural network model for short-term solar power generation forecasting. Neurocomputing 397:415–421

    Article  Google Scholar 

  • Zhang Q, Yang S, Liu M, Liu J, Jiang L (2020) A new crossover mechanism for genetic algorithms for Steiner tree optimization. IEEE Trans Cybern 52:3147–3158

    Article  Google Scholar 

  • Zhou G-B, Wu J, Zhang C-L, Zhou Z-H (2016) Minimal gated unit for recurrent neural networks. Int J Autom Comput 13(3):226–234

    Article  Google Scholar 

Download references

Funding

This work is supported in part by the National Natural Science Foundation of China under grants 61672338 and 61873160.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuan-Ching Li.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Human participants and/or animals

The authors declare that their research has no involvement with human participants and/or animals.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, L., Han, D., Li, D. et al. CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation. Soft Comput 27, 11647–11660 (2023). https://doi.org/10.1007/s00500-023-08220-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-08220-x

Keywords

Navigation