Loading [MathJax]/extensions/MathMenu.js
GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime | IEEE Conference Publication | IEEE Xplore

GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime


Abstract:

Blockchain technology has been invented as a fundamental technique to the cryptocurrency Bitcoin in 2008, which is decentralized, consensus and cryptographic leger. Howev...Show More

Abstract:

Blockchain technology has been invented as a fundamental technique to the cryptocurrency Bitcoin in 2008, which is decentralized, consensus and cryptographic leger. However, due to the anonymity of the Blockchain, Bitcoin has been becoming one critical finance platform applied to transfer or hidden criminal income by offenders. Bitcoin crime refers to criminal activities which use Bitcoin as a criminal tools, criminal object or criminal settlement. Typical bitcoin crimes include online gambling, money laundering, fraud and more. To address these issues, our work aims to propose an efficient method to find transactions related with Bitcoin crime in the Bitcoin network. Which will efficiently support regulators to combat Bitcoin crimes. Through collecting and concluding kinds of Bitcoin crimes, we find several typical relation patterns among Bitcoin transactions with respect to crimes, and then construct and analysis a bitcoin criminal transaction network. At last, we study a graph neural network model with attention mechanisms to detect illegal transactions. Experimental results show that our method can achieve better classification accuracy, and has the ability to efficiently detect criminal clues and locate related illegal transactions.
Date of Conference: 11-13 November 2022
Date Added to IEEE Xplore: 14 March 2023
ISBN Information:
Conference Location: Beijing, China

I. Introduction

Cryptocurrencies such as Bitcoin play an important role in the Web 3.0 and metaverse. Blockchain is a distributed ledger technology that connects blocks of data in an ordered manner. It is made impossible to tamper or forge by means of cryptography. However, due to its decentralized and highly anonymous features, users can transfer money using Bitcoin without having to provide any identifying information [1] [2]. As a result, the real user is hidden behind a virtual address, which gives criminals an opportunity to take advantage of this [3].

Contact IEEE to Subscribe

References

References is not available for this document.