Volume 50 Issue 6
Jun.  2024
Turn off MathJax
Article Contents
LI R G,ZHU J W,WU F D,et al. A decision tree-based discovery method for Bitcoin unreachable nodes[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1861-1867 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0558
Citation: LI R G,ZHU J W,WU F D,et al. A decision tree-based discovery method for Bitcoin unreachable nodes[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1861-1867 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0558

A decision tree-based discovery method for Bitcoin unreachable nodes

doi: 10.13700/j.bh.1001-5965.2022.0558
Funds:  National Key R & D Program of China (2020YFB1006100); National Natural Science Foundation of China (62106060)
More Information
  • Corresponding author: E-mail:liehuangz@bit.edu.cn
  • Received Date: 30 Jun 2022
  • Accepted Date: 26 Aug 2022
  • Available Online: 16 Dec 2022
  • Publish Date: 08 Dec 2022
  • Unreachable nodes refer to nodes that don't accept connection requests in the Bitcoin network, which are difficult to detect and verify. The existing studies mostly focused on the reachable nodes, but less on the unreachable nodes. A new approach is proposed to find the unreachable nodes based on a decision tree model, which can automatically classify unreachable nodes from a large numberof Bitcoin addresses. The results show that the proposed approach got an accuracy of 95.73% and a recall of 91.97% on the experimental dataset. The author applied the approach to the real dataset and verified it by the cyberspace search engines. The proposed approach’s accuracy was 53.75% and the recall was about 76.86%. The distribution of network providers, geographical areas, and the overall number of Unreachable nodes were discussed, which provided technical support for Bitcoin supervision.

     

  • loading
  • [1]
    NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. (2009-03-19)[2022-04-22]. https://cdn.nakamotoinstitute.org/docs/bitcoin.pdf.
    [2]
    蔡晓晴, 邓尧, 张亮, 等. 区块链原理及其核心技术[J]. 计算机学报, 2021, 44(1): 84-131.

    CAI X Q, DENG Y, ZHANG L, et al. The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021, 44(1): 84-131 (in Chinese).
    [3]
    CASTROS. Bitcoin P2P network sniffer[EB/OL]. (2012-08-26)[2022-04-22]. https://github.com/sebicas/bitcoin-sniffer.
    [4]
    LI R G, ZHU J W, XU D W, et al. Bitcoin network measurement and a new approach to infer the topology[J]. China Communications, 2022, 19(10): 169-179. doi: 10.23919/JCC.2022.00.030
    [5]
    LI R G, SHEN M, YU H, et al. A survey on cyberspace search engines[C]//Proceedings of the China Cyber Security Annual Conference. Berlin: Springer, 2020: 206-214.
    [6]
    DONET J A , PÉREZ-SOLA C, HERRERA-JOANCOMARTÍ J. The bitcoin P2P network[C]//Proceedings of the International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2014: 87-102.
    [7]
    FADHIL M, OWENSON G, ADDA M. A Bitcoin model for evaluation of clustering to improve propagation delay in Bitcoin network[C]//Proceedings of the IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing and 15th International Symposiumon Distributed Computing and Applications for Business Engineering. Piscataway: IEEE Press, 2016: 468-475.
    [8]
    PARK S, IM S, SEOL Y, et al. Nodes in the Bitcoin network: Comparative measurement study and survey[J]. IEEE Access, 2019, 7: 57009-57022. doi: 10.1109/ACCESS.2019.2914098
    [9]
    BIRYUKOV A, KHOVRATOVICH D, PUSTOGAROV I. Deanonymisation of clients in Bitcoin P2P network[C]//Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 15-29.
    [10]
    NEUDECKER T, ANDELFINGER P, HARTENSTEIN H. Timing analysis for inferring the topology of the Bitcoin peer-to-peer network[C]//Proceedings of the International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress. Piscataway: IEEE Press, 2016: 358-367.
    [11]
    WANG L, PUSTOGAROV I. Towards better understanding of Bitcoin unreachable peers[EB/OL]. (2017-09-20)[2022-04-27]. http://arxiv.org/abs/1709.06837.pdf.
    [12]
    GRUNDMANN M, AMBERG H, HARTENSTEIN H. On the estimation of the number of unreachable peers in the Bitcoin P2P network by observation of peer announcements[EB/OL]. (2021-02-25)[2022-04-27]. http://arxiv.org/abs/2102.12774.pdf.
    [13]
    FRANZONI F, DAZA V. Improving Bitcoin transaction propagation by leveraging unreachable nodes[C]//Proceedings of the IEEE International Conference on Blockchain. Piscataway: IEEE Press, 2020: 196-203.
    [14]
    BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea[C]//Proceedings of the IEEE Symposium on Security and Privacy. Piscataway: IEEE Press, 2015: 122-134.
    [15]
    MASTAN I D, PAUL S. A new approach to deanonymization of unreachable Bitcoin nodes[C]//Proceedings of the International Conference on Cryptology and Network Security. Berlin: Springer, 2018: 277-298.
    [16]
    PAPPALARDO G, CALDARELLI G, ASTE T. The bitcoin peers network[EB/OL]. (2016-06-30)[2022-04-28]. http://blockchain.cs.ucl.ac.uk/wp-content/uploads/2016/11/P2PFISY2016_paper_32.pdf.
    [17]
    SALLAL M, DE FRÉIN R, MALIK A, et al. An empirical comparison of the security and performance characteristics of topology formation algorithms for Bitcoin networks[J]. Array, 2022, 15: 100221. doi: 10.1016/j.array.2022.100221
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)  / Tables(8)

    Article Metrics

    Article views(196) PDF downloads(6) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return