机器学习与比特币抢劫勒索软件

Nurhaliza Hassan, K. Sood, Gabriel Suzuki
{"title":"机器学习与比特币抢劫勒索软件","authors":"Nurhaliza Hassan, K. Sood, Gabriel Suzuki","doi":"10.1109/SmartNets58706.2023.10215732","DOIUrl":null,"url":null,"abstract":"In recent years, there has been a significant rise in the popularity of cryptocurrency amongst investors worldwide. One cryptocurrency that has been the forerunner in this new digital age is Satoshi Nakamoto’s Bitcoin. As much as it has augmented in value in the past several years, many issues have emerged as new points of concern surrounding cryptocurrency ransomware orchestrated by scammers. As a result of the growing scandals, one notorious case that has made the most headlines is the Bitcoin Heist. We have found a sizable dataset that traces back to the Bitcoin Heist incident. With the help of data science and machine learning fundamentals, we will explain different methodologies to determine whether transactions are malicious or not based on a given Bitcoin address. In this paper, we will explain cryptocurrency and ransomware and further insights into the machine learning concepts behind this issue through various models such as Adaptive Boosting (AdaBoost), Gradient Boosting, K-Nearest Neighbor (KNN), and Random Forest.","PeriodicalId":301834,"journal":{"name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine Learning with Bitcoin Heist Ransomware\",\"authors\":\"Nurhaliza Hassan, K. Sood, Gabriel Suzuki\",\"doi\":\"10.1109/SmartNets58706.2023.10215732\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, there has been a significant rise in the popularity of cryptocurrency amongst investors worldwide. One cryptocurrency that has been the forerunner in this new digital age is Satoshi Nakamoto’s Bitcoin. As much as it has augmented in value in the past several years, many issues have emerged as new points of concern surrounding cryptocurrency ransomware orchestrated by scammers. As a result of the growing scandals, one notorious case that has made the most headlines is the Bitcoin Heist. We have found a sizable dataset that traces back to the Bitcoin Heist incident. With the help of data science and machine learning fundamentals, we will explain different methodologies to determine whether transactions are malicious or not based on a given Bitcoin address. In this paper, we will explain cryptocurrency and ransomware and further insights into the machine learning concepts behind this issue through various models such as Adaptive Boosting (AdaBoost), Gradient Boosting, K-Nearest Neighbor (KNN), and Random Forest.\",\"PeriodicalId\":301834,\"journal\":{\"name\":\"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartNets58706.2023.10215732\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartNets58706.2023.10215732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,加密货币在全球投资者中的受欢迎程度显著上升。中本聪(Satoshi Nakamoto)的比特币是这个新数字时代的先驱。尽管在过去几年中它的价值有所增加,但围绕骗子策划的加密货币勒索软件,许多问题已经成为人们关注的新问题。随着丑闻的不断增多,一个臭名昭著的案例成为了头条新闻,那就是比特币盗窃案。我们找到了一个相当大的数据集可以追溯到比特币抢劫事件。在数据科学和机器学习基础知识的帮助下,我们将解释基于给定比特币地址确定交易是否为恶意交易的不同方法。在本文中,我们将解释加密货币和勒索软件,并通过各种模型(如自适应增强(AdaBoost)、梯度增强、k近邻(KNN)和随机森林)进一步深入了解这个问题背后的机器学习概念。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Machine Learning with Bitcoin Heist Ransomware
In recent years, there has been a significant rise in the popularity of cryptocurrency amongst investors worldwide. One cryptocurrency that has been the forerunner in this new digital age is Satoshi Nakamoto’s Bitcoin. As much as it has augmented in value in the past several years, many issues have emerged as new points of concern surrounding cryptocurrency ransomware orchestrated by scammers. As a result of the growing scandals, one notorious case that has made the most headlines is the Bitcoin Heist. We have found a sizable dataset that traces back to the Bitcoin Heist incident. With the help of data science and machine learning fundamentals, we will explain different methodologies to determine whether transactions are malicious or not based on a given Bitcoin address. In this paper, we will explain cryptocurrency and ransomware and further insights into the machine learning concepts behind this issue through various models such as Adaptive Boosting (AdaBoost), Gradient Boosting, K-Nearest Neighbor (KNN), and Random Forest.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信