Skip to main content

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8437))

Abstract

Over the last 4 years, Bitcoin, a decentralized P2P crypto-currency, has gained widespread attention. The ability to create pseudo-anonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map Bitcoin addresses directly to IP data. We propose a novel approach to creating and evaluating such mappings solely using real-time transaction traffic collected over 5 months. We developed heuristics for identifying ownership relationships between Bitcoin addresses and IP addresses. We discuss the circumstances under which these relationships become apparent and demonstrate how nearly 1,000 Bitcoin addresses can be mapped to their likely owner IPs by leveraging anomalous relaying behavior.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Omitting certain details, a Bitcoin address is simply a public key to which a number of transformations and hashes have been applied. Thus, the terms Bitcoin address and public key can be used interchangeably.

  2. 2.

    We note that this does not mean the creator owns the funds associated with that Bitcoin address (see discussion on eWallets in Sect. 7).

  3. 3.

    We discuss why this assumption is flawed in Sect. 7.

  4. 4.

    We avoided inbound connections to prevent connecting to Tor/I2P nodes. A listening Bitcoin peer cannot be hidden by Tor or I2P since these technologies only protect the anonymity of people making outbound connections.

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, Consulted 1, p. 2012 (2008)

    Google Scholar 

  2. Matonis, J.: WikiLeaks bypasses financial blockade with bitcoin. http://www.forbes.com/sites/jonmatonis/2012/08/20/wikileaks-bypasses-financial-blockade-with-bitcoin/, Forbes. Accessed 20 Aug 2012

  3. NPR: Silk road: not your father’s Amazon.com. http://www.npr.org/2011/06/12/137138008/silk-road-not-your-fathers-amazon-com, NPR. Accessed 12 Jun 2011

  4. Roy, J.: Feds raid online drug market silk road. http://nation.time.com/2013/10/02/alleged-silk-road-proprietor-ross-william-ulbricht-arrested-3-6m-in-bitcoin-seized/, Time. Accessed 2 Oct 2013

  5. Kaminsky, D.: Black Ops of TCP/IP 2011. In: Black Hat USA (2011). http://www.slideshare.net/dakami/black-ops-of-tcpip-2011-black-hat-usa-2011

  6. Kao, A.: RIAA v. Verizon: applying the subpoena provision of the DMCA, Berkeley Tech. LJ, 19, 405 (2004)

    Google Scholar 

  7. Fall, K.R., Stevens, W.R.: TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, Boston (2011)

    Google Scholar 

  8. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)

    Chapter  Google Scholar 

  9. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. IACR Cryptology ePrint Archive vol. 2012, p. 584 (2012)

    Google Scholar 

  10. Androulaki, E., Karame, G., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. IACR Cryptology ePrint Archive, vol. 2012, p. 596 (2012)

    Google Scholar 

  11. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM, October 2013

    Google Scholar 

  12. Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237–250 (2013)

    Article  Google Scholar 

  13. Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy (2013)

    Google Scholar 

  14. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better — how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  15. Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Raw Transactions. https://en.bitcoin.it/wiki/Raw_Transactions

  17. Network. https://en.bitcoin.it/wiki/Network Standard Relaying Section. Accessed 2 Sept 2013

  18. Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: ACM SIGMOD Record, vol. 22, pp. 207–216. ACM (1993)

    Google Scholar 

  19. Broadcast Transaction. http://blockchain.info/pushtx

Download references

Acknowledgments

This material is based upon work supported by the National Science Foundation Grants No. CNS-1228700 and CNS-0905447. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip Koshy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Koshy, P., Koshy, D., McDaniel, P. (2014). An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics