Detection of Anomalous Bitcoin Transactions in Blockchain Using ML

Authors

DOI:

https://doi.org/10.4108/eetiot.7042

Keywords:

Machine learning (ML), Regressor Model, Blockchain, Bitcoin Prediction, IoT

Abstract

An Internet of Things (IoT)-enabled blockchain helps to ensure quick and efficient immutable transactions. Low-power IoT integration with the Bitcoin network has created new opportunities and difficulties for blockchain transactions. Utilising data gathered from IoT-enabled devices, this study investigates the application of ML regression models to analyse and forecast Bitcoin transaction patterns. Several ML regression algorithms, including Lasso Regression, Gradient Boosting, Extreme Boosting, Extra Tree, and Random Forest Regression, are employed to build predictive models. These models are trained using historical Bitcoin transaction data to capture intricate relationships between various transaction parameters. To ensure model robustness and generalisation, cross-validation techniques and hyperparameter tuning are also applied. The empirical results show that the Bitcoin cost prediction of blockchain transactions in terms of time series. Additionally, it highlights the possibility of fusing block- chain analytics with IoT data streams, illuminating how new technologies might work together to enhance financial institutions.

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

[1] Gao M, Lin S, Tian X, He X, He K, Chen S (2024) A bitcoin service community classification method based on Random Forest and improved KNN algorithm. In IET Blockchain- published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology, 1-11. https://doi.org/10.1049/blc2.12064. DOI: https://doi.org/10.1049/blc2.12064

[2] Kaastraa I, Boydb M (1996) Designing a neural network for forecasting financial time series. Neurocomputing 10 (3):215–236. https://doi.org/10.1016/0925-2312(95)00039-9 DOI: https://doi.org/10.1016/0925-2312(95)00039-9

[3] Srivastava S, Chaurasia BK, Singh D (2023) Chapter 18 - Blockchain-based IoT security solutions. In: Pandey R, Goundar S, Fatima, Distributed Computing to Blockchain: Archi- tecture, Technology, and Applications, Elesvier, Ch-18, 327–339. https://doi.org/10.1016/B978-0-323-96146-2.00020-6 DOI: https://doi.org/10.1016/B978-0-323-96146-2.00020-6

[4] Saxena R, Arora D, Nagar V (2023) Classifying Transactional Addresses using Supervised Learning Approaches over Ethereum Blockchain. Procedia Computer Science 218:2018– 2025. https://doi.org/10.1016/j.procs.2023.01.178 DOI: https://doi.org/10.1016/j.procs.2023.01.178

[5] Georgoula I, Pournarakis D, Bilanakos C, Sotiropoulos DN (2015) Using Time-Series and Sentiment Analysis to Detect the Determinants of Bitcoin Prices. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2607167 DOI: https://doi.org/10.2139/ssrn.2607167

[6] Matta M, Lunesu I, Marchesi M (2015) Bitcoin spread prediction using social and web search media. CEUR Workshop Proceedings 1388. Online available at: https://ceur- ws.org/Vol-1388/DeCat2015-paper3.pdf, Last accessed on 22 Jan 2024.

[7] Gu B, Konana P, Liu A, Rajagopalan B, Ghosh J (2006) Identifying Information in Stock Message Boards and Its Implications for Stock Market Efficiency. Workshop on Infor mation Systems and Economics, 1–6. Online available at: https://www.ideal.ece.utexas.edu/pdfs/151.pdf, Last accessed on 22 Jan 2024.

[8] Greaves, Alex and Au B (2015) Using the bitcoin transaction graph to predict the price of bitcoin. Quoted, 1-8. Online available at:https://snap.stanford.edu/class/ cs224w-2015/projects_2015/Using_the_Bitcoin_Transaction_Graph_to_Predict _ the_Price_of_Bitcoin.pdf, Last accessed on 22 Jan 2024.

[9] Madan I, Saluja S, Zhao A, (2015) Automated Bitcoin trading via machine learning algo- rithms,1– Online available at:https://cs229.stanford.edu/proj2014/ Isaac%20Madan,%20Shaurya%20Saluja,%20Aojia%20Zhao,Automated% 20Bitcoin%20Trading%20via%20Machine%20Learning%20Algorithms.pdf, Last ac cessed on 22 Jan 2024.

[10] Catanzaro B, Sundaram N, Keutzer K (2008) Fast support vector machine training and classification on graphics processors. In the proceedings of the 25th International Conference on Machine Learning, 104–111. https://doi.org/10.1145/1390156.1390170 DOI: https://doi.org/10.1145/1390156.1390170

[11] Adhikari M, Hazra A, Menon VG, Chaurasia BK and Mumtaz S (2021) A Roadmap of Next-Generation Wireless Technology for 6G-enabled Vehicular Networks. In IEEE Inter- net of Things Magazine 4(4): 79–85. https://doi.org/10.1109/IOTM.001.2100075 DOI: https://doi.org/10.1109/IOTM.001.2100075

[12] Karthik MG, Krishnan MBM (2021) Detecting Internet of Things Attacks Using Post Pruning Decision Tree-Synthetic Minority Over Sampling Technique. International Journal of Intelligent Engineering and Systems 14:105–114. https://doi.org/10.22266/ijies2021.0831.10. DOI: https://doi.org/10.22266/ijies2021.0831.10

[13] Saxena R, Arora D, Nagar V (2023) Efficient blockchain addresses classification through cascading ensemble learning approach. In International Journal of Electronic Security and Digital Forensics 15(2): 195-210. https://doi.org/10.1504/IJESDF.2023.129278. DOI: https://doi.org/10.1504/IJESDF.2023.129278

[14] Rai S, Chaurasia BK, Gupta R, Verma S (2023) Blockchain-based NFT for Healthcare System. In IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT).700–704. https://doi.org/10.1109/CSNT57126.2023.10134632 DOI: https://doi.org/10.1109/CSNT57126.2023.10134632

[15] Alsaif SA (2023) Machine Learning-Based Ransomware Classification of Bitcoin Trans- actions. Applied Computational Intelligence and Soft Computing 2023:6274260, 1-10. https://doi.org/10.1155/2023/6274260 DOI: https://doi.org/10.1155/2023/6274260

[16] Bitcoin Historical Data, Online available at: https://www.kaggle.com/datasets/mcziel- inski/bitcoin-historical-data, Last accessed on 29 March 2023.

[17] Jatoth C, Jain R, Fiore U, Chatharasupalli S (2022) Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning. In Future Internet 14(1):1–12. https://doi.org/10.3390/fi14010016 DOI: https://doi.org/10.3390/fi14010016

[18] Wimalagunaratne M, Poravi G (2018) A predictive model for the global cryptocurrency market: A holistic approach to predicting cryptocurrency prices. In 8th International Conference on Intelligent Systems, Modelling and Simulation (ISMS), 78–83. https://doi.org/10.1109/ISMS.2018.00024 DOI: https://doi.org/10.1109/ISMS.2018.00024

[19] Sin E, Wang L (2018) Bitcoin price prediction using ensembles of neural networks. In 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discov- ery, 666–671. https://doi.org/10.1109/FSKD.2017.8393351 DOI: https://doi.org/10.1109/FSKD.2017.8393351

[20] Karthik S, Bhadoria RS, Lee JG, Sivaraman AK, Samanta S, Balasundaram A, Chaurasia BK, Ashokkumar, S (2022) Prognostic Kalman Filter Based Bayesian Learning Model for Data Accuracy Prediction. In CMC-Computers Materials & Continua 72 (1): 243–259. https://doi.org/10.32604/cmc.2022.023864 DOI: https://doi.org/10.32604/cmc.2022.023864

[21] Ranstam J, Cook JA (2018) LASSO regression. British Journal of Surgery 105:1348. https://doi.org/10.1002/bjs.10895 DOI: https://doi.org/10.1002/bjs.10895

[22] Sweta B, Siva RKS, Praveen KRM, Kaluri R, Singh S, Gadekallu TR, Alazab M, Tariq U (2020) A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks. Electronics, MDPI 9(219): 1-16. https://doi.org/10.3390/electronics9020219 DOI: https://doi.org/10.3390/electronics9020219

[23] Pelletier Z, Abualkibash M (2020) Evaluating the CIC IDS-2017 Dataset Using Machine Learning Methods and Creating Multiple Predictive Models in the Statistical Computing Language R. In International Research Journal of Advanced Engineering and Science 5 (2):187–191

[24] Bajpai S, Sharma K, Chaurasia BK (2023) Intrusion Detection Framework in IoT Net- works. In SN Computer Science, Springer, Special Issue on Machine Learning and Smart Systems 4(350): 1-16. https://doi.org/10.1007/s42979-023-01770-9 DOI: https://doi.org/10.1007/s42979-023-01770-9

[25] Saranya T, Sridevi S, Deisy C, Chungd TD, Khane MKAA (2020) Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review. Procedia Computer Science (171): 1251–1260. https://doi.org/ 10.1016/j.procs.2020.04.133 DOI: https://doi.org/10.1016/j.procs.2020.04.133

[26] Sharma AK and Chaurasia BK (2023) Blockchain-based NFT for Evidence System. In: Roy, B.K., Chaturvedi, A., Tsaban, B., Hasan, S.U. (eds) Cryptology and Network Security with Machine Learning. ICCNSML 2022. Algorithms for Intelligent Systems. Springer, Singapore, 441-451 https://doi.org/10.1007/978-981-99-2229-1_37 DOI: https://doi.org/10.1007/978-981-99-2229-1_37

[27] Saxena R, Arora D, Nagar V, Chaurasia BK (2023) Privacy Provisioning on Blockchain Transactions of Decentralized Social Media. In Blockchain technology for social media computing, IET, England & Wales, Ch-6, 978-1-83953-543-7, 93 –117, 2023. https://doi.org/10.1049/PBSE019E_ch DOI: https://doi.org/10.1049/PBSE019E_ch6

Downloads

Published

23-08-2024

How to Cite

[1]
S. Bajpai, K. Sharma, and B. Kumar Chaurasia, “Detection of Anomalous Bitcoin Transactions in Blockchain Using ML”, EAI Endorsed Trans IoT, vol. 10, Aug. 2024.