Citation: | LI R G,ZHU J W,WU F D,et al. A decision tree-based discovery method for Bitcoin unreachable nodes[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1861-1867 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0558 |
Unreachable nodes refer to nodes that don't accept connection requests in the Bitcoin network, which are difficult to detect and verify. The existing studies mostly focused on the reachable nodes, but less on the unreachable nodes. A new approach is proposed to find the unreachable nodes based on a decision tree model, which can automatically classify unreachable nodes from a large numberof Bitcoin addresses. The results show that the proposed approach got an accuracy of 95.73% and a recall of 91.97% on the experimental dataset. The author applied the approach to the real dataset and verified it by the cyberspace search engines. The proposed approach’s accuracy was 53.75% and the recall was about 76.86%. The distribution of network providers, geographical areas, and the overall number of Unreachable nodes were discussed, which provided technical support for Bitcoin supervision.
[1] |
NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. (2009-03-19)[2022-04-22]. https://cdn.nakamotoinstitute.org/docs/bitcoin.pdf.
|
[2] |
蔡晓晴, 邓尧, 张亮, 等. 区块链原理及其核心技术[J]. 计算机学报, 2021, 44(1): 84-131.
CAI X Q, DENG Y, ZHANG L, et al. The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021, 44(1): 84-131 (in Chinese).
|
[3] |
CASTROS. Bitcoin P2P network sniffer[EB/OL]. (2012-08-26)[2022-04-22]. https://github.com/sebicas/bitcoin-sniffer.
|
[4] |
LI R G, ZHU J W, XU D W, et al. Bitcoin network measurement and a new approach to infer the topology[J]. China Communications, 2022, 19(10): 169-179. doi: 10.23919/JCC.2022.00.030
|
[5] |
LI R G, SHEN M, YU H, et al. A survey on cyberspace search engines[C]//Proceedings of the China Cyber Security Annual Conference. Berlin: Springer, 2020: 206-214.
|
[6] |
DONET J A , PÉREZ-SOLA C, HERRERA-JOANCOMARTÍ J. The bitcoin P2P network[C]//Proceedings of the International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2014: 87-102.
|
[7] |
FADHIL M, OWENSON G, ADDA M. A Bitcoin model for evaluation of clustering to improve propagation delay in Bitcoin network[C]//Proceedings of the IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing and 15th International Symposiumon Distributed Computing and Applications for Business Engineering. Piscataway: IEEE Press, 2016: 468-475.
|
[8] |
PARK S, IM S, SEOL Y, et al. Nodes in the Bitcoin network: Comparative measurement study and survey[J]. IEEE Access, 2019, 7: 57009-57022. doi: 10.1109/ACCESS.2019.2914098
|
[9] |
BIRYUKOV A, KHOVRATOVICH D, PUSTOGAROV I. Deanonymisation of clients in Bitcoin P2P network[C]//Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 15-29.
|
[10] |
NEUDECKER T, ANDELFINGER P, HARTENSTEIN H. Timing analysis for inferring the topology of the Bitcoin peer-to-peer network[C]//Proceedings of the International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress. Piscataway: IEEE Press, 2016: 358-367.
|
[11] |
WANG L, PUSTOGAROV I. Towards better understanding of Bitcoin unreachable peers[EB/OL]. (2017-09-20)[2022-04-27]. http://arxiv.org/abs/1709.06837.pdf.
|
[12] |
GRUNDMANN M, AMBERG H, HARTENSTEIN H. On the estimation of the number of unreachable peers in the Bitcoin P2P network by observation of peer announcements[EB/OL]. (2021-02-25)[2022-04-27]. http://arxiv.org/abs/2102.12774.pdf.
|
[13] |
FRANZONI F, DAZA V. Improving Bitcoin transaction propagation by leveraging unreachable nodes[C]//Proceedings of the IEEE International Conference on Blockchain. Piscataway: IEEE Press, 2020: 196-203.
|
[14] |
BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea[C]//Proceedings of the IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2015: 122-134.
|
[15] |
MASTAN I D, PAUL S. A new approach to deanonymization of unreachable Bitcoin nodes[C]//Proceedings of the International Conference on Cryptology and Network Security. Berlin: Springer, 2018: 277-298.
|
[16] |
PAPPALARDO G, CALDARELLI G, ASTE T. The bitcoin peers network[EB/OL]. (2016-06-30)[2022-04-28]. http://blockchain.cs.ucl.ac.uk/wp-content/uploads/2016/11/P2PFISY2016_paper_32.pdf.
|
[17] |
SALLAL M, DE FRÉIN R, MALIK A, et al. An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks[J]. Array, 2022, 15: 100221. doi: 10.1016/j.array.2022.100221
|