Discovering Bitcoin Mixing Using Anomaly Detection

  • Mario Alfonso Prado-Romero
  • Christian Doerr
  • Andrés Gago-Alonso
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10657)


Bitcoin is a peer-to-peer electronic currency system which has increased in popularity in recent years, having a market capitalization of billions of dollars. Due to the alleged anonymity of the Bitcoin ecosystem, it has attracted the attention of criminals. Mixing services are intended to provide further anonymity to the Bitcoin network, making it impossible to link the sender of some money with the receiver. These services can be used for money laundering or to finance terrorist groups without being detected. We propose to model the Bitcoin network as a social network and to use community anomaly detection to discover mixing accounts. Furthermore, we present the first technique for detecting Bitcoin accounts associated to money mixing, and demonstrate our proposal effectiveness on real data, using known mixing accounts.


Bitcoin Bitcoin mixing Anomaly detection 


  1. 1.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008).
  2. 2.
    Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and privacy in social networks, pp. 197–223. Springer, Heidelberg (2013). CrossRefGoogle Scholar
  3. 3.
    Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the Bitcoin ecosystem. In: eCrime Researchers Summit (eCRS) (2013)Google Scholar
  4. 4.
    Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web (2013)Google Scholar
  5. 5.
    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Sok: research perspectives and challenges for Bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy (SP) (2015)Google Scholar
  6. 6.
    Möser, M., Böhme, R., Breuker, D.: Towards risk scoring of Bitcoin transactions. In: International Conference on Financial Cryptography and Data Security (2014)Google Scholar
  7. 7.
    Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457–468. Springer, Heidelberg (2014). Google Scholar
  8. 8.
    Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41, 15 (2009)CrossRefGoogle Scholar
  9. 9.
    Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85–126 (2004)CrossRefMATHGoogle Scholar
  10. 10.
    Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29, 626–688 (2015)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., Han, J.: On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2010)Google Scholar
  12. 12.
    Müller, E., Iglesias Sánchez, P., Mülle, Y., Böhm, K.: Ranking outlier nodes in subspaces of attributed graphs. In: 2013 IEEE 29th International Conference on Data Engineering Data Engineering Workshops (ICDEW) (2013)Google Scholar
  13. 13.
    Perozzi, B., Akoglu, L., Iglesias Sánchez, P., Müller, E.: Focused clustering and outlier detection in large attributed graphs. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2014)Google Scholar
  14. 14.
    Prado-Romero, M.A., Gago-Alonso, A.: Detecting contextual collective anomalies at a glance. In: Proceedings of the 23rd International Conference on Pattern Recognition (ICPR) (2016)Google Scholar
  15. 15.
    Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech: Theory Exp. 2008, P10008 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Advanced Technologies Application Center (CENATAV)HavanaCuba
  2. 2.Delft University of Technology (TU Delft)DelftThe Netherlands

Personalised recommendations