{"title":"Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes","authors":"Congcong Yu, Chengpu Jiang, Chenjie Yang, Meng Shen, Liehuang Zhu, Zheng Che","doi":"10.1109/ICDCSW56584.2022.00011","DOIUrl":null,"url":null,"abstract":"In recent years, data mining with users as entities has become a fundamental tool for digital currency investigations. In Ethereum, researchers can perform transaction clustering based on users' behavioral habits and usage patterns in specific scenarios. However, the major shortcoming of these technologies is that they cover only a small fraction compared to the huge number of transactions. In this paper, we propose a stealthy clustering of Ethereum transactions using time leakage from fixed nodes (CIFO), which is applied to all transactions, while also being stealthy and difficult to detect. Leveraging timestamps relayed from $N$ fixed nodes, CIFO can better describe the network properties of transactions, in compared with the first $N$ timestamps. The experimental results show that CIFO can determine whether two transactions enter the network from the same source with the precision of 87%.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSW56584.2022.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, data mining with users as entities has become a fundamental tool for digital currency investigations. In Ethereum, researchers can perform transaction clustering based on users' behavioral habits and usage patterns in specific scenarios. However, the major shortcoming of these technologies is that they cover only a small fraction compared to the huge number of transactions. In this paper, we propose a stealthy clustering of Ethereum transactions using time leakage from fixed nodes (CIFO), which is applied to all transactions, while also being stealthy and difficult to detect. Leveraging timestamps relayed from $N$ fixed nodes, CIFO can better describe the network properties of transactions, in compared with the first $N$ timestamps. The experimental results show that CIFO can determine whether two transactions enter the network from the same source with the precision of 87%.