Software Solution To Identify The End Receiver Of Cryptocurrency Transaction

Page 1


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

Software Solution To Identify The End Receiver Of Cryptocurrency Transaction

1Guide Department Of AIDS 2345Students ,Department Of Computer Engineering Dy Patil School Of Engineering And Technology Ambi, Pune, Maharashtra ,India

Abstract - Blockchain, a distributed record technology, may be used for a variety of purposes. Perhaps the most advanced blockchain applications with unavoidable appropriation among these are decentralized payment systems, like Bitcoin. This thesis offers methods for examining transactions in untested services and cryptocurrencies. Online payments are made safely using cryptocurrencies. Bitcoin, the original cryptocurrency, uses pseudonymous addresses for payments with little assurance of privacy or anonymity.

Key Words: 1.blockchain, 2.cryptocurrency, 3.smart contract, 4.anonymity, 5.privacy regulation, 4.decentralized 5.conditional anonymous payment.

1.INTRODUCTION

Moneylaunderingormixingservicesareamongthemostdeceptivetoolsthatburythelinkbetweensenderandrecipientof moneyincryptocurrencies:combiningdifferentsourcesofmoneywithdirtymoneymakestrackingdirtymoneycomplicated andobscureanddistortstherelationshipbetweenthesenderandreceiverofmoney.Asaresult,moneylaunderingservices are widely used to eliminate the track of income from ransomware, thefts, sales of weapons and drugs, and other illegal activitiesbycombiningtheseincomeswithothersourcesofmoneyanddisruptingthetrackingoftheseincomes.Blockchainis arelativelyrecenttrend,especiallyfueledbythepopularityofBitcoinanditscapacitytocreateatrustworthyecosystemfor conductingbusinessinasettingwhereinformationisasymmetricalandidentitiesareunpredictable(forexample,becauseof itsdecentralized,immutable,verifiable,andprogrammablefeatures).Thisservesasanadditionaldegreeofprivacyforsome people,shieldingtheirfinancialactivitiesfrompryingeyes.Forothers,thisservesasaveilthathidestheirillegalactivities, suchascurrencytheftorthesaleofcounterfeititems.

1.1 REVIEW OF LITERATURE

A. An advanced Decentralized Conditional Anonymous Payment System for Cryptocurrency using Blockchain

Incontrasttostandarde-moneyschemes,decentralizedpaymentsystemsrelyonadistributedrecordratherthantrusted parties. The Decentralized Anonymous Payment (DAP) structures in the current system are completely unmanageable. Ultimately,theseframeworkscanbemisusedforcriminalpurposes,suchasunlawfultaxevasionandcybercrimeinstances (such as paying a ransomwarepayout or engaging in online coercion). can be used for illegal purposes. Anyone can deanonymizewithoutmuchdifficulty.AnefficientDecentralizedContingentAnonymousPayment(DCAP)systemisusedinthe proposedworktoachievesomedegreeofbalancebetweensecurityguaranteesandguidelines.Certaincompoundsareallowed to be included in our proposed framework. We also provide a strongconstruction of the DCAP framework (based on the proposedCAPConditionAnonymousPaymentscheme)andassesstheproposal'sabilitytomeetsecuritystandards.Inthis research, wedeveloped a decentralized restricted anonymous payment (DCAP) system that achieves both obscurity and guidelineproperties.Oursuggestedframeworkisincrediblystrongandsafe.

B. Mixing detection on Bitcoin transactions using statistical patterns

Financialcrimeshaveexpandeddramaticallyintheseservices,alongwiththegrowingpopularityofcryptocurrenciesand theiruseinmanysituations.Moneylaunderingormoney-mixingservicesareamongthemostdishonestinstrumentsthat concealtheconnectionbetweenthesourceandtherecipientofcryptocurrency.Therelationshipbetweentheoriginatorand therecipientofmoneyisdistortedwhenmanysourcesoffundingarecombinedwithdirtymoney,makingtrackingitdifficult andelusive.Thischaracteristichasledtothewidespreadusageofmoneylaunderingservices,whichcombineincomefrom ransomware,theft,thesellingofgunsanddrugs,andotherillicitactivitieswithothersourcesoffundingandinterferewiththe trackingoftheseincomes.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

C. Identity Chain

Asapublicledger,blockchainisadecentralizedsystemthatisrunbyanetworkandisindependentofanyreliablethirdparty. Blockchain, a cutting-edge technology, has made it possible for a wide range of applications, particularly in the banking industry(usuallyknownasDeFi),includingborderlesstransactionsandsmartcontracts.Blockchainhasmadeitpossiblefora wholenewsectoroffinance,butitsfullpotentialhasnotyetbeenrealized.Utilizingblockchain'sfullpotentialishinderedbya number of obstacles, chief among them being regulatory. Using blockchain and holding users accountable are regulatory concernsinseveralnations.

D. Sending Money Like Sending E-mails: Cryptoaddresses, The Universal Decentralised Identities

Decentralizationisafundamentalprerequisiteforasystemthatmapsuser-friendlyidentitiestotheinitialuser-unfriendly strings.Whiledecentralizedtrustlesssystemsfrequentlylackuser-friendlyidentities,centralizedsystemstypicallydo.Inorder toavoidbecomingcentralized(andpossiblyasinglepointoffailure)inadecentralizedenvironment,thenewsystemmustbe abletokeepupwiththesystemsforwhichitoffersIDs.Thispaperpresentsourcryptoaddresssystem,whichusesthecurrent DNSinfrastructuretooffere-mail-likeIDs.Byassigningauser-selectedservertoeachoftheirdomainnames,DNSusageoffers simpledecentralizationatthe"domainnamespace"level.Theresolutionofcryptoaddressestotheoriginalcryptographic identitiesisprovidedbyservers.

BoththeDNSandservercommunicationaspectsofthesystemaresafeguarded.Thesystemisglobalandhasawiderangeof potentialuses;therefore,itsapplicabilityisnotrestrictedtocryptocurrencies.

E.Investigating transactions in cryptocurrencies

TheissuesofcensorshipandcentralizationinafinancialsystemarelessenedbyBitcoin.Justbysupplyingtheirpublickey, anyone can freely build a bitcoin wallet and receive coins. To create such a wallet, no user identification, passport, or verificationisrequired.ThisgetsbeyondtheconventionalfinancialKnowYourCustomer(KYC)principles,whichformthe basisofasetofguidelinesthatfinancialinstitutionsemploytoidentifycustomersbeforedoingbusinessand,asaresult,predict andpreventcriminalactivity.Thisindependenceallowscoinstobesenttoanyaddresswithouthindranceordiscrimination. Unlessthenewownerspecificallyrequestsit,thesecoinscannotbeexchangedorreturned.AccordingtotheBitcoinwhite paper,thesystembydefaultprovidespseudonymityfortransactions.

1.2 PROBLEM DEFINITION

Anewparadigmindigitalbankinghasemergedasaresultofthequickriseofcryptocurrencies,offeringconsumerssafe, decentralized,andfrequentlyanonymousmeansofconductingbusiness.Blockchaintechnology'spseudonymityhasprivacy benefits,butitalsopresentsseriousproblemsforregulatorymonitoring,fraudprevention,andcompliance.Thechallengeof identifyingthefinalrecipientinbitcointransactionsisoneofthemainissuesfacingregulators,financialinstitutions,andlaw enforcement.Thefollowingareasarewherethisproblemismostproblematic:

1. Money Laundering and Financial Crime:

Because pseudonymous addresses, mixers, and privacy coins may frequently conceal the eventual recipient, cryptocurrenciesarebeingusedmoreandmoreinmoneylaundering,taxevasion,andotherfinancialcrimes.Finding transactionendpointsiscrucialfortrackingdownillegalcashandprosecutingpeopleengagedinillegalactivity.

1. Regulatory Compliance: ToadheretoAnti-MoneyLaundering(AML)andCombatingtheFinancingofTerrorism(CFT) norms, numerous nations are enacting laws mandating that bitcoin transactions be traceable. Conducting client due diligence ismandatory forfinancial institutionsand exchanges, but it can be difficultwithout toolsto determinethe transactiondestination.

2. Fraud and Scam Prevention: Because end-receiver identification is opaque, criminals might take advantage of blockchainsystemstocreateintricate,hard-to-tracehoaxes.Inordertoevadedetection,scamslikePonzischemesand phishingattacksfrequentlyuseanonymousorpseudonymousaddresses,whichmakesitchallengingtorecoverassetsor identifythescammers.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

2. Privacy-Preserving Technology Challenges:

Additional challenges arise from privacy-focused cryptocurrencies and devices, like tumblers or mixers, which purposefullyobscuretransactionhistories.Tosolvethisproblemandunderstandcomplicatedtransactionswithout jeopardizingtherightsoflawfuluserswhorespecttheirprivacy,sophisticatedsolutionsareneeded

3. Methodology

Thissectionwilloutlineourapproach,whichincludesgatheringthenecessaryinformationandidentifyingrecurringthemesin themixingtransactionsinordertodevelopanalgorithmforfilteringthem.

1.DATACOLLECTIONWerequireaccesstothecompleteblockchaintransactiondataandlabelsfortransactionsthattookpart inmixingservicesproceduresinordertolookintomixingtransactions.

1.1)ExtractingBlockchainInformationUsingafull-nodeBitcoinclient,wegatheredthenecessarydatafromtheblockchain usingitsJSON-RPCAPIsinordertoaccesstransactiondata.Informationaboutblocksandtransactions,includingblockhashes, transactioninputandoutputaddresses,transferredvalues,timestamps,and other necessaryinformationincludedinthe blockchain, can be obtained after executing the Bitcoin client in accordance with its established RPC capabilities. 1..2)GatheringLabelsforTransactionMixingPeopleusemixingservicesforavarietyofreasons,suchashidingtheirfinancial activitiestoavoidtaxes,commitcrimes,orprotecttheirprivacy.Itisevidentthatpeoplearehesitanttorevealtheirmixing transactions,regardlessoftheirmotivations,andasanticipated,thereisnodatasetofexchangespertainingtoservicemixing. Eventhoughtherearecertainlabelsavailableformoneylaunderingserviceaddresses,heuristicsandclusteringtechniques thatlabelotheraddressesbasedonthepreviouslylabeledaddressesmaycauseinaccuracies.Ordinaryaddressescouldbe linkedtomoneylaunderingservicesthroughoutthisprocedure,makingitmisleadingtoexaminetheirtransactions.Wehadto gatherprecisedataonourownsincetherewasnopredefineddataset.

ThreeofthemostpopularmixingservicesthatweremostlydiscussedonReddit2andBitcoinTalk1werechoseninorderto compileadatasetofmixingtransactions.Byusingtheirservice,puttingfundstothedesignatedaddress,andthentransferring fundsfromthemtoourtargetaddressviathemoneylaunderingprocedure,everytimeweusedtheseservices,weconducted twomixedtransactions:oneforthedepositandoneforthewithdrawal.ThesethreechosenmixingservicesarelistedinTable alongwiththequantityofmixingtransactionsweproducedforeach.

2.STATISTICALPATTERNEXTRACTIONWehadtousestraightforwardstatisticaltechniquesthatworkwellwithsmalldatain ordertoextractthemixingpatternbecausegatheringarichdatasetofmixingtransactionswasbothexpensiveandtimeconsuming.First,webrieflygooverthemechanismsthatvariousmixingprovidersemploy.Twoprimarycategoriesofmixing servicesaredescribed.•Conventionalmixingservices:Inclassicmixingservices,theservicedecideshowmuchmoneyfrom desiredtransactionscanbecombinedwithapredeterminedquantityofmoney.Theseservicesfacilitatethetransferoffunds betweensendersandrecipientsatrandom.Theservicegeneratesafreshrandomdepositaddressforthesenderinthefirst stage.Theaddressisupdatedeverytimetheuserreloadsthepagecontainingthemixingrequest.Asendermustthenwaituntil atleastN−1othermixingrequestswiththesameamounthavebeenrecordedbeforedepositingtheirfundsintotheaddress theyhavecreated.Inordertoremovethetraceofthemoneytransferbetweenthesenderandtherecipient,themixingservice inthisstage,alsoknownastheintermediatestage,generatestransactionsinwhichtheseNinputsareswitchedatrandomand sent to N anonymous output addresses. The anonymity set is set to a probability of 1/N by this action. This displays the likelihoodofdiscoveringtherightconnectionbetweenasenderandtheirmatchingrecipient.Theoperationoftheseservicesis depictedinFigure1.•Contemporarymixingservices:Theseserviceshavethreestages,justasconventionalservices.The requestedfundsarefirsttransferredtoarandomlygenerateddepositaddressbythemixingservice.

3.TRANSACTION-LEVEL PATTERNSIN THEFIRSTPHASEOFDETECTION Wediscoveredrecurrenttendencieswhenwe lookedintothemixingtransactionswemade.Withdrawaltransactionsshowedthesetrends.Sincetheformatofthedeposit transactionswasstandardacrossthewholeblockchainandthesendersmadethembyusingtheirwalletapplicationtodeposit moneytothemixingservice,wewereunabletoidentifyanypatternsinthedeposittransactionsatthetransactionlevel.

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

Software/Tool KeyFeature UseCase Example

ChainalysisKYT Real-time transctionmonitoringris kscoring

TRMLabs Blockchainintelligence AIpowerdanalytics

Scorechain Multi-blockchain support,sanctions screening,real-time monitoring

Elliptic(Explore) Tracingfundsacross over100cryptoassets withconfigurablerisk rulesSource/destination tracingforfinancial

DetectSuspicious andesureAML compilance

Investigatefraud, tracefunds,and buildcompliance cases

Riskscoringand regulatory reporting

Source/destinatio ntracingfor financial institutions

Identifyillict wallet addressesand tracing

Investigate fraud,trace funds,and build compliance cases

Riskscoring andregulatory reporting

Monitoring walletbehavior toprevent fraud.

Thesearchresultsrevealanumberofsoftwareapplicationsdesignedtomonitorcryptocurrencytransactionsanddetermine theultimatereceivers.Thesetoolsusewalletaddresstracking,blockchainanalysis,andforensictechniquestotracktheflowof money,particularlyincaseslikedrugtrafficking.GitHubrepositories,industryreports,andresearcharticlesaresomeofthe resourcesthatdiscussthemethodsandtechnologyusedinthissubject.Thefollowingisasummaryofthefindings:

Oneofthemostdishonest methodsthatconcealstheconnectionbetweenthesourceandtherecipientoffundsismoney launderingormoneymixingservices.Thepicturedisplaysaprogramnamed"Krypt"thatisintendedtoidentifythefinal cryptocurrencyrecipient.It positionsitselfasa crypto market partner bymaking itsimple forcustomers to buyandsell reliablecryptocurrency.Numeroussources,includingBinance,CoinMarketCap,Blockchain,Corbne,ECNCapital,andPrincipal, aresupportedbytheplatform.Witha"Sendnow"option,itallowsuserstosendbitcoinbyenteringtherecipient'saddress, quantity(ETH),keyword,Twitteraccount,andmessage.

Fig -1: Login Page

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

Thepicturedisplaysaprogramnamed"Krypt"thatisintendedtoidentifythefinalcryptocurrencyrecipient.Itpositionsitself asacryptomarketpartnerbymakingitsimpleforcustomerstobuyand sellreliablecryptocurrency.Numeroussources, includingBinance,CoinMarketCap,Blockchain,Corbne,ECNCapital,andPrincipal,aresupportedbytheplatform.Witha"Send now"option,itallowsuserstosendbitcoinbyenteringtherecipient'saddress,quantity(ETH),keyword,Twitteraccount,and message.

Fig -3 :Latest Transactions

The screen captureshowsa logof "Latest Transactions," whichappears to be relatedto cryptocurrencies or blockchains becauseETH(Ether)andhexadecimalwalletaddressesarementioned.Theaddressofthesender(From),theaddressofthe recipient(To),theamountofETHtransferred,amessage,andthetransactiondateandtimestampareallincludedinevery transaction.0.001ETHwastransferredonDecember22,2021,at6:25:22PM,withthemessage"HellotherefromaccountT!" Thisisthefirsttransaction.Onthesameday,at6:22:24PM,thesecondlogsa0.0005ETHtransferwiththemessageTest.The thirdtransactionshowsthatonDecember21,2021,at4:33:21PM,001ETHwastransferredwithcomment

4. CONCLUSIONS

Theproposedworkhaseffectivelyachievedanonymityandregulationpropertiesinourdecentralizedconditionalanonymous payment(DCAP)system.BeforeconstructingourDCAP,wedevelopedaconditionalanonymouspayment(CAP)methodusing theformalsemanticandsecuritymodels.Itwillalsoshowitssecurityinsidethedesignatedsecuritymodelandprovidea concreteCAPdesignbasedonourproposedknowledgeschemesignature.BuildingontheproposedCAP,wecreatedourDCAP anddemonstratedhowitmightsatisfytherelatedsecurityrequirements.Ourprototype'sperformancewillnextbeevaluated bycomparingittoZeroCash'sunderthesametestingconditions.Theresultsindicatedthatourplancouldbeimplementedin therealworld.Weproposedatechniquefordetectingmixingtransactionsbasedonthestatisticalpatternswesawinthe mixingprocess.Duetothelackofreliablelabeleddata,weconstructedmixingtransactionsusingthreewidelyusedmixing services:MixTum,Blender,andCryptoMixer.Bylookingatthesetransactions,wewereabletoidentifyrecurringtrendsatboth the transaction and chain levels. By examining each transaction in the blockchain, comparing it with the patterns we discovered,andidentifyingmixingtransactions,wewereabletodifferentiatebetweenaddressesconnectedtomixingservices andaddressesconnectedtotheusersofmixingservices.Ourapproachis100%accurate

REFERENCES

[1] ArdeshirShojaeenasab,AmirPashaMotamed.,BehnamBahrak,“MixingdetectiononBitcointransactionsusingstatistical patterns,”©2022

[2] ChaviKapoor.,VeeravalliShivadeepak,Konthamvinaykumarreddy“AnadvancedDecentralizedConditionalAnonymous PaymentSystemforCryptocurrencyusingBlockchain”©2021

Fig -2:Services

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 12 Issue: 04 | Apr 2025 www.irjet.net p-ISSN: 2395-0072

[3] MahdiDarabi,AmirrezaFathi,“IdentityChain”©2022

[4] HaaroonMYousaf,“Investigatingtransactionsincryptocurrencies”©2022

[5] R.Muthumeenakshi,BalasubramaniamS.,CharanjeetSingh,PallaviV.Sapkale,“AnEfficientandSecureAuthentication ApproachinVANETUsingLocationandSignature-BasedServices”,AdHoc&SensorWirelessNetworks53(Issue1-2), 59-83,2022

[6] UttamD.Kolekar,“DevelopmentofOptimizedandSecureRoutingAlgorithmusingAODV,ACOandLSBSteganographyfor MobileAd-HocNetwork”,JournalofAdvancedResearchinDynamicalandControlSystems(JARDCS),Vol.11,issue9,pp. 560-568,Sept2019.

[7] Sandeep B Hake, “Design and development of universal test bench for engine aftertreatment controls system”, Internationaljournalofadvancedresearchinelectronicsandcommunicationengineering,Volume6,Issue4,Pages309312,2017.

[8] Samarjeet Powalkar, “Fast face recognition based on wavelet transform on pca” International Journal of Scientific ResearchinScience,Engineering&Technology,Vol1,Issue4,PP21-24,2015.

[9] UWaghmode,DPDeshmukh,SEkshinge,AKurund,“AnInnovativeApproachUsingCyberSecurityforSteganographyfor Wireless Adhoc Mobile Network Application”International Conference on Science Technology Engineering and Management(ICSTEM),Pages1-5,2024.

[10] C Kaur, DS Rao, S Bandhekar, “Enhanced Land Use and Land Cover Classification Through Human Group-based ParticleSwarm Optimization-Ant Colony Optimization Integration with Convolutional Neural Networ”, International JournalofAdvancedComputerScience&Applications,Vol14,Issue11,2023.

[11] DivyaRohatgi,VeeraAnkaluVuyyuru,KVSSRamakrishna,YousefABakerEl-Ebiary,VAntonyAsirDaniel, “Feline Wolf Net: A Hybrid Lion-Grey Wolf Optimization Deep LearningModel for Ovarian Cancer Detection”, International JournalofAdvancedComputerScienceandApplications,Vol14,Issue9,2023.

[12] UttamD.Kolekar,“Trust-BasedSecureRoutinginMobileAdHocNetworkUsingHybridOptimizationAlgorithm”,The ComputerJournal,OxfordUniversityPress,Vol.62,issue10,pp.1528-1545,Oct2019.

[13] UttamD.Kolekar,“E-TDGO:AnEncryptedTrustbaseddolphinglowwormoptimizationforsecureroutinginmobile ad-hocnetwork”,InternationalJournalofCommunicationSystems,Wileypublication,Vol.33,issue7,May2020.

[14] DilipPDeshmukh,AbhijeetKadam,“EfficientDevelopmentofGestureLanguageTranslationSystemusingCNN”15th InternationalConferenceonComputingCommunicationandNetworkingTechnologies(ICCCNT)Pages1-6,2024.

[15] PrajwalKote,MouneshaZonde,OmJadhav,VaibhavBhasme,NitinADawande“AdvancedandSecureDataSharing SchemewithBlockchainandIPFS:ABriefReview”15thInternationalConferenceonComputingCommunicationand NetworkingTechnologies(ICCCNT),Pages1-5,2024.

[16] Prasant,P.,Saravanan,D.,Sangeethapriya,J.,“NRlayer2andlayer3”MachineLearningforMobileCommunications, Taylor&Francis,CRCPress,pp.32–45,2024.

[17] Borana,G.K.,Vishwakarma,N.H.,Tamboli,S.,M.,Dawande,N.A.,“DefendingtheDigitalWorld:AComprehensiveGuide AgainstSQLInjectionThreats”2ndInternationalConferenceonInventiveComputingandInformatics,ICICI,pp.707–714, 2024.

[18] Deshmukh,D.P.et.al,“AnInnovativeApproachUsingCyberSecurityforSteganographyforWirelessAdhocMobile NetworkApplication”InternationalConferenceonScience,Technology,EngineeringandManagement,2024

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Software Solution To Identify The End Receiver Of Cryptocurrency Transaction by IRJET Journal - Issuu