Abstract
Cryptocurrencies have increasingly become the preferred choice for private transactions due to their anonymity and decentralized features. When a user creates transactions using wallet software with built-in Tor module, their identity information is further protected. At the same time, however, this combination of Tor and cryptocurrency is misused to carry out illegal acts, while the perpetrators are difficult to detect. Therefore, it is important to study traffic correlation methods for cryptocurrencies over Tor to maintain a healthy blockchain ecosystem. In this paper, based on existing work, we propose CryptoCorr, a traffic analysis model for cryptocurrency wallets, which can screening the collected Tor traffic data based on time window and flow features, and implement traffic correlation for cryptocurrency wallets based on deep learning architecture. We validate the proposed model by constructing a dataset with 82077 collected packets of wallet, and the experiment results demonstrate the effectiveness of the CryptoCorr model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shen, M., Duan, J., Zhu, L., Zhang, J., Du, X., Guizani, M.: Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229–1241 (2020)
Shen, M., et al.: Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942–954 (2020)
de Balthasar, T., Hernandez-Castro, J.: An analysis of bitcoin laundry services. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 297–312. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70290-2_18
Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: WWW 2018 (2018)
Raheem, A., Raheem, R., Chen, T.M., Alkhayyat, A.: Estimation of ransomware payments in bitcoin ecosystem, pp. 1667–1674 (2021)
Biryukov, A., Pustogarov, I., Thill, F., Weinmann, R.-P.: Content and popularity analysis of tor hidden services. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 188–193 (2014)
Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International Conference on World Wide Web, WWW 2013, pp. 213–224. Association for Computing Machinery, New York (2013)
Lee, S., et al.: Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web, January 2019
Foley, S., Karlsen, J., Putnins, T.: Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev. Finan. Stud. 32, 1798–1853 (2019)
Edman, M., Syverson, P.: As-awareness in tor path selection, pp. 380–389, January 2009
Akhoondi, M., Curtis, Yu., Madhyastha, H.: LASTor: a low-latency as-aware tor client. IEEE/ACM Trans. Netw. 22, 476–490 (2012)
Sun, Y., et al.: RAPTOR: routing attacks on privacy in Tor. In: Proceedings of the 24th USENIX Security Symposium, March 2015
Nasr, M., Bahramali, A., Houmansadr, A.: DeepCorr: strong flow correlation attacks on tor using deep learning, August 2018
Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network, May 2014
Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. Secur. Priv. Soc. Netw. 3, 07 (2011)
Shen, M., Liu, Y., Zhu, L., Du, X., Hu, J.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inf. Forensics Secur. 16, 2046–2059 (2021)
Shen, M., Gao, Z., Zhu, L., Xu, K.: Efficient fine-grained website fingerprinting via encrypted traffic analysis with deep learning. In: 29th IEEE/ACM International Symposium on Quality of Service, IWQOS 2021, Tokyo, Japan, 25–28 June 2021, pp. 1–10. IEEE (2021)
Shen, M., Wei, M., Zhu, L., Wang, M.: Classification of encrypted traffic with second-order Markov chains and application attribute bigrams. IEEE Trans. Inf. Forensics Secur. 12(8), 1830–1843 (2017)
Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367–2380 (2021)
Postel, J.: RFC864, May 1983
van Saberhagen, N.: CryptoNote v 2.0, October 2013
van Saberhagen, N.: Anoncoin (2013)
Acknowledgements
This work is partially supported by National Key R &D Program of China under Grant 2020YFB1006101.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kong, X., Shen, M., Che, Z., Yu, C., Zhu, L. (2022). Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor. In: Svetinovic, D., Zhang, Y., Luo, X., Huang, X., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2022. Communications in Computer and Information Science, vol 1679. Springer, Singapore. https://doi.org/10.1007/978-981-19-8043-5_21
Download citation
DOI: https://doi.org/10.1007/978-981-19-8043-5_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8042-8
Online ISBN: 978-981-19-8043-5
eBook Packages: Computer ScienceComputer Science (R0)