Skip to main content

Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1679))

Included in the following conference series:

  • 619 Accesses

Abstract

Cryptocurrencies have increasingly become the preferred choice for private transactions due to their anonymity and decentralized features. When a user creates transactions using wallet software with built-in Tor module, their identity information is further protected. At the same time, however, this combination of Tor and cryptocurrency is misused to carry out illegal acts, while the perpetrators are difficult to detect. Therefore, it is important to study traffic correlation methods for cryptocurrencies over Tor to maintain a healthy blockchain ecosystem. In this paper, based on existing work, we propose CryptoCorr, a traffic analysis model for cryptocurrency wallets, which can screening the collected Tor traffic data based on time window and flow features, and implement traffic correlation for cryptocurrency wallets based on deep learning architecture. We validate the proposed model by constructing a dataset with 82077 collected packets of wallet, and the experiment results demonstrate the effectiveness of the CryptoCorr model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shen, M., Duan, J., Zhu, L., Zhang, J., Du, X., Guizani, M.: Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229–1241 (2020)

    Article  Google Scholar 

  2. Shen, M., et al.: Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942–954 (2020)

    Article  Google Scholar 

  3. de Balthasar, T., Hernandez-Castro, J.: An analysis of bitcoin laundry services. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 297–312. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70290-2_18

    Chapter  Google Scholar 

  4. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: WWW 2018 (2018)

    Google Scholar 

  5. Raheem, A., Raheem, R., Chen, T.M., Alkhayyat, A.: Estimation of ransomware payments in bitcoin ecosystem, pp. 1667–1674 (2021)

    Google Scholar 

  6. Biryukov, A., Pustogarov, I., Thill, F., Weinmann, R.-P.: Content and popularity analysis of tor hidden services. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 188–193 (2014)

    Google Scholar 

  7. Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, WWW 2013, pp. 213–224. Association for Computing Machinery, New York (2013)

    Google Scholar 

  8. Lee, S., et al.: Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web, January 2019

    Google Scholar 

  9. Foley, S., Karlsen, J., Putnins, T.: Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev. Finan. Stud. 32, 1798–1853 (2019)

    Article  Google Scholar 

  10. Edman, M., Syverson, P.: As-awareness in tor path selection, pp. 380–389, January 2009

    Google Scholar 

  11. Akhoondi, M., Curtis, Yu., Madhyastha, H.: LASTor: a low-latency as-aware tor client. IEEE/ACM Trans. Netw. 22, 476–490 (2012)

    Google Scholar 

  12. Sun, Y., et al.: RAPTOR: routing attacks on privacy in Tor. In: Proceedings of the 24th USENIX Security Symposium, March 2015

    Google Scholar 

  13. Nasr, M., Bahramali, A., Houmansadr, A.: DeepCorr: strong flow correlation attacks on tor using deep learning, August 2018

    Google Scholar 

  14. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network, May 2014

    Google Scholar 

  15. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. Secur. Priv. Soc. Netw. 3, 07 (2011)

    Google Scholar 

  16. Shen, M., Liu, Y., Zhu, L., Du, X., Hu, J.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inf. Forensics Secur. 16, 2046–2059 (2021)

    Article  Google Scholar 

  17. Shen, M., Gao, Z., Zhu, L., Xu, K.: Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In: 29th IEEE/ACM International Symposium on Quality of Service, IWQOS 2021, Tokyo, Japan, 25–28 June 2021, pp. 1–10. IEEE (2021)

    Google Scholar 

  18. Shen, M., Wei, M., Zhu, L., Wang, M.: Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8), 1830–1843 (2017)

    Article  Google Scholar 

  19. Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367–2380 (2021)

    Article  Google Scholar 

  20. Postel, J.: RFC864, May 1983

    Google Scholar 

  21. van Saberhagen, N.: CryptoNote v 2.0, October 2013

    Google Scholar 

  22. van Saberhagen, N.: Anoncoin (2013)

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by National Key R &D Program of China under Grant 2020YFB1006101.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kong, X., Shen, M., Che, Z., Yu, C., Zhu, L. (2022). Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor. In: Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2022. Communications in Computer and Information Science, vol 1679. Springer, Singapore. https://doi.org/10.1007/978-981-19-8043-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8043-5_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8042-8

  • Online ISBN: 978-981-19-8043-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics