Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Mano Yadav
{"title":"Blockchain and crypto forensics: Investigating crypto frauds","authors":"Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Mano Yadav","doi":"10.1002/nem.2255","DOIUrl":null,"url":null,"abstract":"<p>In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2255","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.
在过去几年中,加密货币因其去中心化的特性、快速安全的交易以及投资和投机的潜力而获得了广泛的认可。但是,加密货币的普及也导致了加密货币欺诈的增加,包括诈骗、网络钓鱼攻击、庞氏骗局和其他犯罪活动。虽然有关加密货币欺诈的文献很少,但深入研究对于识别不同加密货币的各种欺诈行为至关重要。为了填补这一空白,一项研究调查了各种加密货币中与加密货币相关的欺诈行为,并提供了加密取证和区块链取证的分类标准。此外,我们还介绍了一种集成人工智能(AI)和区块链技术的架构,用于调查和防范加密货币欺诈事件。我们使用几种机器学习(ML)分类算法对建议设计的有效性进行了评估。评估结论证实,随机森林(RF)分类器表现最佳,准确率最高,达到 97.5%。一旦 ML 分类器检测到加密货币欺诈,信息就会被安全地存储在跨行星文件系统(IPFS)中;文件的哈希值也会通过智能合约存储在区块链中。执法部门可以利用区块链技术确保对欺诈性加密交易的访问。对拟议的架构进行了带宽利用率测试。尽管区块链和加密取证具有潜在优势,但仍存在一些问题和挑战,包括隐私问题、标准化以及难以识别加密货币之间的欺诈行为。最后,本文讨论了区块链和加密取证在调查加密货币欺诈方面存在的各种问题和挑战。
期刊介绍:
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.