Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information
Abstract
:1. Introduction
- Aiming at a large amount of unlabeled data in the training data, a self-supervised method is used to alleviate it.
- Data imbalance problem is addressed through application of the novel loss function by considering mutual information.
- Experiment is conducted on real data sets.
2. Related Work
2.1. Detection in Cryptocurrency Violation
2.2. Graph Self-Supervised
2.3. Improvement for Data Imbalance Problem
3. Method
3.1. Question Raised
3.2. Monitoring Illegal Transactions of Cryptocurrency Relied on GNN
Graph Convolution Network
3.3. Self-Supervised Learning
3.3.1. Mutual Information
3.3.2. Maximize Mutual Information
3.3.3. Maximizing Mutual Information of Graphs
3.4. Mutual Information as Prior Loss
3.4.1. Cross Entropy
3.4.2. Improving the Loss Function Based on Mutual Information
4. Experiments and Analysis
4.1. Dataset
4.2. Metrics
4.3. Experiment with Result Analysis
- Traditional methods for dealing with data imbalance are ineffective in detecting illegal cryptocurrency transactions. It can be seen that recall is relatively high regardless of over-sampling or under-sampling, but precision is relatively low, resulting in the final F1 value having a poor effect.
- Drawing from the presented table, we can infer that the mutual information-based loss function outperforms with cross entropy loss and focal loss by 4% and 2%, respectively, in terms of F1-score when used with GCN. Thus, it can be inferred that the mutual information-based loss function has a significant positive impact on the detection of illegal cryptocurrency transactions.
- The implementation of self-supervised in GCN has alleviated the problem of illegal cryptocurrency detection. The F1-score of the cross-entropy loss with self-supervised have rised 3% compare with the F1-score of the cross-entropy loss without self-supervised. The loss function F1-score with self-supervised increased by 2% when compared to the loss function F1-score without self-supervised. There is no improvement and no intention of decreasing the F1-score value of focal loss. It demonstrates that the self-supervised mechanism can effectively reduce the existence of illegal cryptocurrency transactions.
Model | Loss | Precision | Recall | F1 |
---|---|---|---|---|
GCN | Oversampling | 0.23 | 0.86 | 0.37 |
Undersampling | 0.31 | 0.81 | 0.45 | |
cross | 0.70 | 0.52 | 0.58 | |
focal | 0.68 | 0.55 | 0.60 | |
prior | 0.69 | 0.58 | 0.62 | |
SSL | cross | 0.57 | 0.65 | 0.61 |
focal | 0.53 | 0.69 | 0.60 | |
prior | 0.66 | 0.63 | 0.64 |
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Gai, K.; Qiu, M.; Sun, X. A survey on FinTech. J. Netw. Comput. Appl. 2018, 103, 262–273. [Google Scholar] [CrossRef]
- Kruisbergen, E.W.; Leukfeldt, E.R.; Kleemans, E.R.; Roks, R.A. Money talks money laundering choices of organized crime offenders in a digital age. J. Crime Justice 2019, 42, 569–581. [Google Scholar] [CrossRef]
- Fu, B.; Yu, X.; Feng, T. CT-GCN: A phishing identification model for blockchain cryptocurrency transactions. Int. J. Inf. Secur. 2022, 21, 1223–1232. [Google Scholar] [CrossRef]
- Huang, T.; Lin, D.; Wu, J. Ethereum account classification based on graph convolutional network. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 2528–2532. [Google Scholar] [CrossRef]
- Gaihre, A.; Pandey, S.; Liu, H. Deanonymizing cryptocurrency with graph learning: The promises and challenges. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; IEEE: Piscataway, NJ, USA; pp. 1–3. [Google Scholar]
- Cui, W.; Gao, C. WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies. Blockchain Res. Appl. 2023, 4, 100108. [Google Scholar] [CrossRef]
- Ghosh, A.; Gupta, S.; Dua, A.; Kumar, N. Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects. J. Netw. Comput. Appl. 2020, 163, 102635. [Google Scholar] [CrossRef]
- Lin, T.Y.; Goyal, P.; Girshick, R.; He, K.; Dollár, P. Focal loss for dense object detection. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 2980–2988. [Google Scholar]
- Farrugia, S.; Ellul, J.; Azzopardi, G. Detection of illicit accounts over the Ethereum blockchain. Expert Syst. Appl. 2020, 150, 113318. [Google Scholar] [CrossRef] [Green Version]
- Kumar, N.; Singh, A.; Handa, A.; Shukla, S.K. Detecting malicious accounts on the Ethereum blockchain with supervised learning. In Proceedings of the Cyber Security Cryptography and Machine Learning: Fourth International Symposium (CSCML 2020), Be’er Sheva, Israel, 2–3 July 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 94–109. [Google Scholar]
- Gu, Z.; Lin, D.; Wu, J. On-chain analysis-based detection of abnormal transaction amount on cryptocurrency exchanges. Phys. Stat. Mech. Its Appl. 2022, 604, 127799. [Google Scholar] [CrossRef]
- Ammer, M.A.; Aldhyani, T.H. Deep Learning Algorithm to Predict Cryptocurrency Fluctuation Prices: Increasing Investment Awareness. Electronics 2022, 11, 2349. [Google Scholar] [CrossRef]
- Akcora, C.G.; Li, Y.; Gel, Y.R.; Kantarcioglu, M. Bitcoinheist: Topological data analysis for ransomware detection on the bitcoin blockchain. arXiv 2019, arXiv:1906.07852. [Google Scholar]
- Chen, W.; Guo, X.; Chen, Z.; Zheng, Z.; Lu, Y. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In Proceedings of the IJCAI, Yokohama, Japan, 11–17 July 2020; Volume 7, pp. 4456–4462. [Google Scholar]
- Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain meets cloud computing: A survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
- Weber, M.; Domeniconi, G.; Chen, J.; Weidele, D.K.I.; Bellei, C.; Robinson, T.; Leiserson, C.E. Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv 2019, arXiv:1908.02591. [Google Scholar]
- Liu, X.; Zhang, F.; Hou, Z.; Mian, L.; Wang, Z.; Zhang, J.; Tang, J. Self-supervised learning: Generative or contrastive. IEEE Trans. Knowl. Data Eng. 2021, 35, 857–876. [Google Scholar] [CrossRef]
- Hassani, K.; Khasahmadi, A.H. Contrastive multi-view representation learning on graphs. In Proceedings of the International Conference on Machine Learning, PMLR, Virtual, 13–18 July 2020; pp. 4116–4126. [Google Scholar]
- Qiu, J.; Chen, Q.; Dong, Y.; Zhang, J.; Yang, H.; Ding, M.; Wang, K.; Tang, J. Gcc: Graph contrastive coding for graph neural network pre-training. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Virtual, 6–10 July 2020; pp. 1150–1160. [Google Scholar]
- Cao, K.; Wei, C.; Gaidon, A.; Arechiga, N.; Ma, T. Learning imbalanced datasets with label-distribution-aware margin loss. Adv. Neural Inf. Process. Syst. 2019, 32, 1567–1578. [Google Scholar]
- Buda, M.; Maki, A.; Mazurowski, M.A. A systematic study of the class imbalance problem in convolutional neural networks. Neural Netw. 2018, 106, 249–259. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Gai, K.; Wu, Y.; Zhu, L.; Zhang, Z.; Qiu, M. Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans. Ind. Inform. 2019, 16, 4156–4165. [Google Scholar] [CrossRef]
- Misra, I.; Maaten, L.v.d. Self-supervised learning of pretext-invariant representations. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020; pp. 6707–6717. [Google Scholar]
- Hendrycks, D.; Mazeika, M.; Kadavath, S.; Song, D. Using self-supervised learning can improve model robustness and uncertainty. Adv. Neural Inf. Process. Syst. 2019, 32, 15663–15674. [Google Scholar]
- Nowozin, S.; Cseke, B.; Tomioka, R. F-Gan: Training generative neural samplers using variational divergence minimization. Adv. Neural Inf. Process. Syst. 2016, 29, 271–279. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, K.; Dong, G.; Bian, D. Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information. Electronics 2023, 12, 1542. https://doi.org/10.3390/electronics12071542
Zhao K, Dong G, Bian D. Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information. Electronics. 2023; 12(7):1542. https://doi.org/10.3390/electronics12071542
Chicago/Turabian StyleZhao, Kewei, Guixin Dong, and Dong Bian. 2023. "Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information" Electronics 12, no. 7: 1542. https://doi.org/10.3390/electronics12071542
APA StyleZhao, K., Dong, G., & Bian, D. (2023). Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information. Electronics, 12(7), 1542. https://doi.org/10.3390/electronics12071542