The next phase of identifying illicit activity in Bitcoin

Jack Nicholls,Aditya Kuppa,Nhien‐An Le‐Khac
DOI: https://doi.org/10.1002/nem.2259
2024-01-17
International Journal of Network Management
Abstract:Over $20bn of criminal proceeds has transmitted through cryptocurrency in 2022. Current methods of tracking and identifying illicit activity in Bitcoin through heuristics are being evaded by cybercriminals through obfuscation services and leveraging the advanced mechanics of Bitcoin. We present the next phase of identifying illicit activity in Bitcoin through deep learning methodology and understanding of the evasive tactics used by criminals and privacy advocates. Identifying illicit behavior in the Bitcoin network is a well‐explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head‐on against expert cybercriminals.
computer science, information systems,telecommunications
What problem does this paper attempt to address?