A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 438
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChoi, Jinhoko
dc.contributor.authorKim, Jaehanko
dc.contributor.authorSong, Minkyooko
dc.contributor.authorKim, Hannako
dc.contributor.authorPark, Nahyeonko
dc.contributor.authorSeo, Minjaeko
dc.contributor.authorJin, Youngjinko
dc.contributor.authorShin, Seungwonko
dc.date.accessioned2022-07-11T09:00:40Z-
dc.date.available2022-07-11T09:00:40Z-
dc.date.created2022-07-11-
dc.date.created2022-07-11-
dc.date.created2022-07-11-
dc.date.created2022-07-11-
dc.date.issued2022-07-
dc.identifier.citationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E105D, no.7, pp.1296 - 1307-
dc.identifier.issn0916-8532-
dc.identifier.urihttp://hdl.handle.net/10203/297321-
dc.description.abstractCryptocurrency abuse has become a critical problem. Due to the anonymous nature of cryptocurrency, criminals commonly adopt cryptocurrency for trading drugs and deceiving people without revealing their identities. Despite its significance and severity, only few works have studied how cryptocurrency has been abused in the real world, and they only provide some limited measurement results. Thus, to provide a more in-depth understanding on the cryptocurrency abuse cases, we present a large-scale analysis on various Bitcoin abuse types using 200,507 realworld reports collected by victims from 214 countries. We scrutinize observable abuse trends, which are closely related to real-world incidents, to understand the causality of the abuses. Furthermore, we investigate the semantics of various cryptocurrency abuse types to show that several abuse types overlap in meaning and to provide valuable insight into the public dataset. In addition, we delve into abuse channels to identify which widely-known platforms can be maliciously deployed by abusers following the COVID-19 pandemic outbreak. Consequently, we demonstrate the polarization property of Bitcoin addresses practically utilized on transactions, and confirm the possible usage of public report data for providing clues to track cyber threats. We expect that this research on Bitcoin abuse can empirically reach victims more effectively than cybercrime, which is subject to professional investigation.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATION ENGINEERS-
dc.titleA Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports-
dc.typeArticle-
dc.identifier.wosid000819468700005-
dc.identifier.scopusid2-s2.0-85135210826-
dc.type.rimsART-
dc.citation.volumeE105D-
dc.citation.issue7-
dc.citation.beginningpage1296-
dc.citation.endingpage1307-
dc.citation.publicationnameIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.identifier.doi10.1587/transinf.2021EDP7182-
dc.contributor.localauthorShin, Seungwon-
dc.contributor.nonIdAuthorChoi, Jinho-
dc.contributor.nonIdAuthorSong, Minkyoo-
dc.contributor.nonIdAuthorKim, Hanna-
dc.contributor.nonIdAuthorPark, Nahyeon-
dc.contributor.nonIdAuthorJin, Youngjin-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorBitcoin abuse-
dc.subject.keywordAuthorclustering-
dc.subject.keywordAuthorcryptocurrency-
dc.subject.keywordAuthorcyber crime-
dc.subject.keywordAuthorcyber threat intelligence-
dc.subject.keywordAuthorpublic data-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0