{"title":"b区块链中交易去匿名化的方法和手段","authors":"V.V. Dubina, R. Oliynykov","doi":"10.30837/rt.2021.4.207.04","DOIUrl":null,"url":null,"abstract":"This paper presents the results of a study of the properties of transactions formation and processing of in blockchain systems, aimed to identify existing barriers to the secure functioning of the network, processing and transmission of data between users, and to determine possible means of deanonymizing transactions. The anonymity of the network is one of the reasons for cryptocurrencies popularity and widespread use of blockchain technology. However, its presence is the basis for unscrupulous transactions, criminal actions of fraudsters and attacks on the system. Therefore, one of the main issues today is to ensure the reliable storage of information and the ability to track suspicious activity and timely protection of users in blockchain systems. The article examines known methods of increasing anonymity and maintaining confidentiality in modern networks based on the principles of blockchain technology, the threats arising from their use and the possible ways of tracking the actions of system participants. A comparative description of known tracking tools and possible means of de-anonymization of the history of completed transactions is given. As a result of the study, it was proposed to use a separate platform to analyze the network in real time, identify threats and their timely elimination, with the ability to visualize relationships and build address graphs as a result of tracking the entire chain of transactions. The tool makes it possible to implement a search among cryptocurrency addresses, blocks, transactions and tags, as well as to identify clusters associated with a particular address. The system analyzes the network in real time to gain insight into the statistics. Particular attention is paid to detecting so-called anomalies, i.e., the identification of transactions that deviate from standard structures. This allows identifying and tracking potentially malicious activities at an early stage.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":null,"pages":null},"PeriodicalIF":0.2000,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methods and means of deanonymization of transactions in blockchain\",\"authors\":\"V.V. Dubina, R. Oliynykov\",\"doi\":\"10.30837/rt.2021.4.207.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the results of a study of the properties of transactions formation and processing of in blockchain systems, aimed to identify existing barriers to the secure functioning of the network, processing and transmission of data between users, and to determine possible means of deanonymizing transactions. The anonymity of the network is one of the reasons for cryptocurrencies popularity and widespread use of blockchain technology. However, its presence is the basis for unscrupulous transactions, criminal actions of fraudsters and attacks on the system. Therefore, one of the main issues today is to ensure the reliable storage of information and the ability to track suspicious activity and timely protection of users in blockchain systems. The article examines known methods of increasing anonymity and maintaining confidentiality in modern networks based on the principles of blockchain technology, the threats arising from their use and the possible ways of tracking the actions of system participants. A comparative description of known tracking tools and possible means of de-anonymization of the history of completed transactions is given. As a result of the study, it was proposed to use a separate platform to analyze the network in real time, identify threats and their timely elimination, with the ability to visualize relationships and build address graphs as a result of tracking the entire chain of transactions. The tool makes it possible to implement a search among cryptocurrency addresses, blocks, transactions and tags, as well as to identify clusters associated with a particular address. The system analyzes the network in real time to gain insight into the statistics. Particular attention is paid to detecting so-called anomalies, i.e., the identification of transactions that deviate from standard structures. This allows identifying and tracking potentially malicious activities at an early stage.\",\"PeriodicalId\":41675,\"journal\":{\"name\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2021-12-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30837/rt.2021.4.207.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2021.4.207.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Methods and means of deanonymization of transactions in blockchain
This paper presents the results of a study of the properties of transactions formation and processing of in blockchain systems, aimed to identify existing barriers to the secure functioning of the network, processing and transmission of data between users, and to determine possible means of deanonymizing transactions. The anonymity of the network is one of the reasons for cryptocurrencies popularity and widespread use of blockchain technology. However, its presence is the basis for unscrupulous transactions, criminal actions of fraudsters and attacks on the system. Therefore, one of the main issues today is to ensure the reliable storage of information and the ability to track suspicious activity and timely protection of users in blockchain systems. The article examines known methods of increasing anonymity and maintaining confidentiality in modern networks based on the principles of blockchain technology, the threats arising from their use and the possible ways of tracking the actions of system participants. A comparative description of known tracking tools and possible means of de-anonymization of the history of completed transactions is given. As a result of the study, it was proposed to use a separate platform to analyze the network in real time, identify threats and their timely elimination, with the ability to visualize relationships and build address graphs as a result of tracking the entire chain of transactions. The tool makes it possible to implement a search among cryptocurrency addresses, blocks, transactions and tags, as well as to identify clusters associated with a particular address. The system analyzes the network in real time to gain insight into the statistics. Particular attention is paid to detecting so-called anomalies, i.e., the identification of transactions that deviate from standard structures. This allows identifying and tracking potentially malicious activities at an early stage.