Skip to main content

Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks

  • Conference paper
  • First Online:
Machine Learning and Knowledge Discovery in Databases. Research Track (ECML PKDD 2021)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12975))

Abstract

Motivated by the recent surge of criminal activities with cross-cryptocurrency trades, we introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks. We postulate that anomalies in the underlying blockchain transaction graph that are composed of multiple layers are likely to also be manifested in anomalous patterns of the network shape properties. As such, we invoke the machinery of clique persistent homology on graphs to systematically and efficiently track evolution of the network shape and, as a result, to detect changes in the underlying network topology and geometry. We develop a new persistence summary for multilayer networks, called stacked persistence diagram, and prove its stability under input data perturbations. We validate our new topological anomaly detection framework in application to dynamic multilayer networks from the Ethereum Blockchain and the Ripple Credit Network, and demonstrate that our stacked PD approach substantially outperforms state-of-art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akcora, C.G., Dixon, M.F., Gel, Y.R., Kantarcioglu, M.: Bitcoin risk modeling with blockchain graphs. Econ. Lett. 173, 138–142 (2018)

    Article  Google Scholar 

  2. Adams, H., et al.: Persistence images: a stable vector representation of persistent homology. JMLR 18(1), 218–252 (2017)

    MathSciNet  Google Scholar 

  3. Akcora, C.G., Li, Y., Gel, Y.R., Kantarcioglu, M.: BitcoinHeist: topological data analysis for ransomware detection on the bitcoin blockchain. In: IJCAI, pp. 1–9 (2020)

    Google Scholar 

  4. Aleta, A., Moreno, Y.: Multilayer networks in a nutshell. Annu. Rev. Condens. Matter Phys. 10, 45–62 (2019)

    Article  Google Scholar 

  5. Alves, G.A.L., Mangioni, G., Cingolani, I., Rodrigues, A.F., Panzarasa, P., Moreno, Y.: The nested structural organization of the worldwide trade multi-layer network. Sci. Rep. 9, 1–14 (2019)

    Article  Google Scholar 

  6. Bansal, M., Sharma, D.: Ranking and discovering anomalous neighborhoods in attributed multiplex networks. In: ACM IKDD CoDS COMAD, pp. 46–54 (2020)

    Google Scholar 

  7. Berry, E., Chen, Y.-C., Cisewski-Kehe, J., Fasy, B.T.: Functional summaries of persistence diagrams. J. Appl. Comput. Topol. 4(2), 211–262 (2020). https://doi.org/10.1007/s41468-020-00048-w

    Article  MathSciNet  MATH  Google Scholar 

  8. Biasotti, S., Falcidieno, B., Giorgi, D., Spagnuolo, M.: Mathematical Tools for Shape Analysis and Description. Morgan & Claypool (2014)

    Google Scholar 

  9. Carlsson, G.: Topology and data. BAMS 46(2), 255–308 (2009)

    Article  MathSciNet  Google Scholar 

  10. Chazal, F., Cohen-Steiner, D., Guibas, L.J., Oudot, S.: The stability of persistence diagrams revisited. Technical report, CRISAM - Inria Sophia Antipolis, June 2008

    Google Scholar 

  11. Chazal, F., De Silva, V., Glisse, M., Oudot, S.: The Structure and Stability of Persistence Modules. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-42545-0

    Book  MATH  Google Scholar 

  12. Chazal, F., Michel, B.: An introduction to topological data analysis: fundamental and practical aspects for data scientists. arXiv:1710.04019 (2017)

  13. Chen, H., Zhang, N.: Graph-based change point detection. Ann. Stat. 43(1), 139–176 (2015)

    Article  MathSciNet  Google Scholar 

  14. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on ethereum: towards healthier blockchain technology. In: WWW, pp. 1409–1418 (2018)

    Google Scholar 

  15. Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: the rise of decentralized business models. J. Bus. Ventur. Insights 13, e00151 (2020)

    Article  Google Scholar 

  16. de la Concha, A., Martinez-Jaramillo, S., Carmona, C.: Multiplex financial networks: revealing the level of interconnectedness in the banking system. In: Cherifi, C., Cherifi, H., Karsai, M., Musolesi, M. (eds.) COMPLEX NETWORKS 2017 2017. SCI, vol. 689, pp. 1135–1148. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72150-7_92

    Chapter  Google Scholar 

  17. Di Battista, G., Di Donato, V., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: BitconeView: visualization of flows in the bitcoin transaction graph. In: IEEE VizSec, pp. 1–8 (2015)

    Google Scholar 

  18. Dong, H., Chen, N., Wang, K.: Modeling and change detection for count-weighted multilayer networks. Technometrics 62(2), 184–195 (2020)

    Article  MathSciNet  Google Scholar 

  19. FBK: Multilayer Network Datasets Released for Reproducibility, June 2020. https://comunelab.fbk.eu/data.php

  20. Eswaran, D., Faloutsos, C., Guha, S., Mishra, N.: SpotLight: detecting anomalies in streaming graphs. In: ACM SIGKDD, pp. 1378–1386 (2018)

    Google Scholar 

  21. Fernandes, G., Rodrigues, J.J.P.C., Carvalho, L.F., Al-Muhtadi, J.F., Proença, M.L.: A comprehensive survey on network anomaly detection. Telecommun. Syst. 70(3), 447–489 (2018). https://doi.org/10.1007/s11235-018-0475-8

    Article  Google Scholar 

  22. Ferretti, S., D’Angelo, G.: On the ethereum blockchain structure: a complex networks theory perspective. Concurr. Comput. Pract. Exp. 32, e5493 (2019)

    Google Scholar 

  23. Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)

    Article  MathSciNet  Google Scholar 

  24. Gidea, M., Goldsmith, D., Katz, Y.A., Roldan, P., Shmalo, Y.: Topological recognition of critical transitions in time series of cryptocurrencies. Phys. A: Stat. Mech. Apps 548, 123843 (2020)

    Article  Google Scholar 

  25. Greaves, A., Au, B.: Using the bitcoin transaction graph to predict the price of bitcoin. No Data (2015)

    Google Scholar 

  26. Grossman, J.W., Zeitman, R.: An inherently iterative computation of Ackermann’s function. Theoret. Comput. Sci. 57(2), 327–330 (1988)

    Article  MathSciNet  Google Scholar 

  27. Hajij, M., Wang, B., Scheidegger, C., Rosen, P.: Visual detection of structural changes in time-varying graphs using persistent homology. In: IEEE PacificVis, pp. 125–134 (2018)

    Google Scholar 

  28. Hochenbaum, J., Vallis, O.S., Kejariwal, A.: Automatic anomaly detection in the cloud via statistical learning. arXiv: 1704.07706 (2017)

  29. Hofer, C.D., Kwitt, R., Niethammer, M.: Learning representations of persistence barcodes. JMLR 20(126), 1–45 (2019)

    MathSciNet  MATH  Google Scholar 

  30. Kerber, M., Morozov, D., Nigmetov, A.: Geometry helps to compare persistence diagrams. In: ALENEX, pp. 103–112 (2016)

    Google Scholar 

  31. Koutra, D., Shah, N., Vogelstein, J.T., Gallagher, B., Faloutsos, C.: DeltaCon: principled massive-graph similarity function with attribution. ACM TKDD 10(3), 1–43 (2016)

    Article  Google Scholar 

  32. Kurbucz, M.T.: Predicting the price of bitcoin by the most frequent edges of its transaction network. Econ. Lett. 184, 108655 (2019)

    Article  Google Scholar 

  33. Lee, X.T., Khan, A., Sen Gupta, S., Ong, Y.H., Liu, X.: Measurements, analyses, and insights on the entire ethereum blockchain network. In: WWW, pp. 155–166 (2020)

    Google Scholar 

  34. Li, J., Chen, C., Tong, H., Liu, H.: Multi-layered network embedding. In: SIAM SDM, pp. 684–692 (2018)

    Google Scholar 

  35. Li, Y., Islambekov, U., Akcora, C., Smirnova, E., Gel, Y.R., Kantarcioglu, M.: Dissecting ethereum blockchain analytics: what we learn from topology and geometry of the ethereum graph? In: SIAM SDM, pp. 523–531 (2020)

    Google Scholar 

  36. Mittal, R., Bhatia, M.: Anomaly detection in multiplex networks. Proc. Comput. Sci. 125, 609–616 (2018)

    Article  Google Scholar 

  37. Moin, A., Sirer, E.G., Sekniqi, K.: A classification framework for stablecoin designs. arXiv:1910.10098 (2019)

  38. Moreno-Sanchez, P., Modi, N., Songhela, R., Kate, A., Fahmy, S.: Mind your credit: assessing the health of the ripple credit network. In: WWW, pp. 329–338 (2018)

    Google Scholar 

  39. Moreno-Sanchez, P., Zafar, M.B., Kate, A.: Listening to whispers of ripple: linking wallets and deanonymizing transactions in the ripple network. PoPETs 2016(4), 436–453 (2016)

    Article  Google Scholar 

  40. Munch, E., et al.: Probabilistic fréchet means for time varying persistence diagrams. Electron. J. Stat. 9(1), 1173–1204 (2015)

    Article  MathSciNet  Google Scholar 

  41. Nelson, D.: Crypto criminals have already stolen \$1.4b in 2020, says ciphertrace, June 2020. https://www.coindesk.com/author/danielnelsoncoindesk-com

  42. Nocedal, J., Wright, S.J.: Numerical Optimization. Springer, Heidelberg (2006). https://doi.org/10.1007/978-0-387-40065-5

    Book  MATH  Google Scholar 

  43. Phetsouvanh, S., Oggier, F., Datta, A.: EGRET: extortion graph exploration techniques in the bitcoin network. In: IEEE ICDMW, pp. 244–251 (2018)

    Google Scholar 

  44. Pourhabibi, T., Ong, K.L., Kam, B.H., Boo, Y.L.: Fraud detection: a systematic literature review of graph-based anomaly detection approaches. Decis. Support Syst. 133, 113303 (2020)

    Article  Google Scholar 

  45. Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. Wiley Interdisc. Rev.: Comput. Stat. 7(3), 223–247 (2015)

    Article  MathSciNet  Google Scholar 

  46. Rieck, B., Fugacci, U., Lukasczyk, J., Leitte, H.: Clique community persistence: a topological visual analysis approach for complex networks. IEEE Trans. Vis. Comput. Graph. 24(1), 822–831 (2017)

    Article  Google Scholar 

  47. Suárez, G., Gallos, L., Fefferman, N.: A case study in tailoring a bio-inspired cyber-security algorithm: designing anomaly detection for multilayer networks. In: SPW, pp. 281–286 (2018)

    Google Scholar 

  48. Taylor, D., Porter, M.A., Mucha, P.J.: Tunable eigenvector-based centralities for multiplex and temporal networks. arXiv:1904.02059 (2019)

  49. Vallis, O., Hochenbaum, J., Kejariwal, A.: A novel technique for long-term anomaly detection in the cloud. In: USENIX HotCloud (2014)

    Google Scholar 

  50. Victor, F., Lüders, B.K.: Measuring ethereum-based ERC20 token networks. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 113–129. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_8

    Chapter  Google Scholar 

  51. Wang, Y., Chakrabarti, A., Sivakoff, D., Parthasarathy, S.: Fast change point detection on dynamic social networks. arXiv:1705.07325 (2017)

  52. Wasserman, L.: Topological data analysis. Ann. Rev. Stat. Appl. 5, 501–532 (2018)

    Article  MathSciNet  Google Scholar 

  53. Weber, M., et al.: Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. Preprint arXiv:1908.02591 (2019)

  54. Wikipedia contribs: History of bitcoin, November 2013. https://en.wikipedia.org/wiki/History_of_bitcoin. Accessed 01 Mar 2020

  55. Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: USENIX Security, pp. 1609–1625 (2019)

    Google Scholar 

  56. Yoon, M., Hooi, B., Shin, K., Faloutsos, C.: Fast and accurate anomaly detection in dynamic graphs with a two-pronged approach. In: ACM SIGKDD, pp. 647–657 (2019)

    Google Scholar 

  57. Yousaf, H., Kappos, G., Meiklejohn, S.: Tracing transactions across cryptocurrency ledgers. In: USENIX Security, pp. 837–850 (2019)

    Google Scholar 

  58. Yu, W., Cheng, W., Aggarwal, C.C., Zhang, K., Chen, H., Wang, W.: NetWalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: ACM SIGKDD, pp. 2672–2681 (2018)

    Google Scholar 

  59. Yuvaraj, M., Dey, A.K., Lyubchich, V., Gel, Y.R., Poor, H.V.: Topological clustering of multilayer networks. PNAS (2021). https://doi.org/10.1073/pnas.2019994118

  60. Zhao, D.: An algebraic-topological approach to processing cross-blockchain transactions. arXiv preprint arXiv:2008.08208 (2020)

  61. Zhao, Q., Wang, Y.: Learning metrics for persistence-based summaries and applications for graph classification. In: NeurIPS, pp. 9855–9866 (2019)

    Google Scholar 

  62. Zhu, T., Li, P., Chen, K., Chen, Y., Yu, L.: Hyper-network based change point detection in dynamic networks. Semant. Scholar (2018)

    Google Scholar 

  63. Zomorodian, A.: Fast construction of the Vietoris-Rips complex. Comput. Graph. 34(3), 263–271 (2010)

    Article  Google Scholar 

  64. Zomorodian, A.: The tidy set: a minimal simplicial set for computing homology of clique complexes. In: SOCG, pp. 257–266 (2010)

    Google Scholar 

Download references

Acknowledgements

This work is supported in part by NSF Grants No. ECCS 2039701, DMS 1925346, CNS 1837627, OAC 1828467, IIS 1939728, CNS 2029661 and Canadian NSERC Discovery Grant RGPIN-2020-05665. The authors would like to thank Baris Coskunuzer for insightful discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Ofori-Boateng .

Editor information

Editors and Affiliations

1 Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (pdf 396 KB)

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ofori-Boateng, D., Dominguez, I.S., Akcora, C., Kantarcioglu, M., Gel, Y.R. (2021). Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks. In: Oliver, N., Pérez-Cruz, F., Kramer, S., Read, J., Lozano, J.A. (eds) Machine Learning and Knowledge Discovery in Databases. Research Track. ECML PKDD 2021. Lecture Notes in Computer Science(), vol 12975. Springer, Cham. https://doi.org/10.1007/978-3-030-86486-6_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86486-6_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86485-9

  • Online ISBN: 978-3-030-86486-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics