{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:08Z","timestamp":1742913548287,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811982842"},{"type":"electronic","value":"9789811982859"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"vor","delay-in-days":343,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nowadays, the cyberspace search engines have showed great power to find entities and services in the network, which provide new ideas and methods to detect the Bitcoin nodes. This paper introduces the Bitcoin\u2019s P2P network and nodes including the reachable nodes and the unreachable nodes. Then, the results of detecting reachable nodes by the cyberspace search engines are showed. Next, the author proposes a new approach to find and verify the unreachable nodes by the cyberspace search engines. Finally, this paper illustrates the de-anonymization of some Bitcoin nodes by the cyberspace search engines, which map some node\u2019s IP addresses to real Bitcoin entities, such as Zeblockchain (a browser website), Microwallet (a wallet website) and Laurentia Pool (a non-profit pool website).<\/jats:p>","DOI":"10.1007\/978-981-19-8285-9_9","type":"book-chapter","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T20:02:48Z","timestamp":1670616168000},"page":"129-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Bitcoin Nodes by the Cyberspace Search Engines"],"prefix":"10.1007","author":[{"given":"Ruiguang","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiawei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Fudong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,10]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Li, R., Shen, M., Yu, H., et al.: A Survey on Cyberspace Search Engines. Springer, Singapore. Springer, Singapore (2020)","DOI":"10.1007\/978-981-33-4922-3_15"},{"key":"9_CR2","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2009). http:\/\/www.bitcoin.org\/bitcoin.pdf"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Donet, J.A.D., P\u00e9rez-Sola, C., Herrera-Joancomart\u00ed, J.: The bitcoin P2P network. In: Proceedings of Financial Cryptography. Data Security FC Workshops, BITCOIN WAHC, vol. 16, pp. 87\u2013102 (2014)","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"9_CR4","unstructured":"Sebicas.: Bitcoin p2p Network Sniffer (2013). http:\/\/github.com\/sebicas\/bitcoin-sniffer"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Proceedings of IEEE 13th International Conference Peer-Peer Computer (P2P), pp. 1_10 (2013)","DOI":"10.1109\/P2P.2013.6688704"},{"key":"9_CR6","unstructured":"Pappalardo, G., Caldarelli, G., Aste, T.: The Bitcoin Peers Network. http:\/\/blockchain.cs.ucl.ac.uk\/wpcontent\/uploads\/2016\/11\/P2PFISY2016_paper_32.pdf. Accessed 30 Jun 2016"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Fadhil, M., Owenson, G., Adda, M.: A bitcoin model for evaluation of clustering to improve propagation delay in bitcoin network. In: Proceedings of IEEE International Conference Computer Science Engineering (CSE), IEEE International Conference Embedded Ubiquitous Computing (EUC), 15th International Symposium Distribution Computer Appllication for Business Engineering (DCABES), pp. 468\u2013475 (2016)","DOI":"10.1109\/CSE-EUC-DCABES.2016.226"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"57009","DOI":"10.1109\/ACCESS.2019.2914098","volume":"7","author":"S Park","year":"2019","unstructured":"Park, S., Im, S., Seol, Y., Paek, J.: Nodes in the bitcoin network: comparative measurement study and survey. IEEE Access 7, 57009\u201357022 (2019)","journal-title":"IEEE Access"},{"key":"9_CR9","unstructured":"https:\/\/fofa.so\/"},{"key":"9_CR10","unstructured":"https:\/\/www.zoomeye.org\/"},{"key":"9_CR11","unstructured":"https:\/\/bitnodes.io\/"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of ACM SIGSAC Conference Computer Communication Security, pp. 15\u201329 (2014)","DOI":"10.1145\/2660267.2660379"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Neudecker, T., Andelfinger, P., Hartenstein, H.: Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In: 2016 International IEEE Conferences on Ubiquitous Intelligence Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People,Meets the and Smart World (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), pp. 358\u2013367 (2016) out","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"9_CR14","unstructured":"Liang, W., Pustogarov, I.: Towards Better Understanding of Bitcoin Unreachable Peers (2017)"},{"key":"9_CR15","unstructured":"Grundmann, M., Amberg, H., Hartenstein, H.: On the estimation of the number of unreachable peers in the bitcoin P2P network by observation of peer announcements (2021)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Franzoni, F., Daza, V.: Improving bitcoin transaction propagation by leveraging unreachable nodes. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 196\u2013203. IEEE (2020)","DOI":"10.1109\/Blockchain50366.2020.00031"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over Tor isn\u2019t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122\u2013134 (2015). https:\/\/doi.org\/10.1109\/SP.2015.15","DOI":"10.1109\/SP.2015.15"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Mastan, I.D., Paul, S.: A new approach to deanonymization of unreachable bitcoin nodes. In: Capkun, S., Chow, S. (eds.) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science, vol. 11261. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02641-7_13","DOI":"10.1007\/978-3-030-02641-7_13"},{"issue":"19","key":"9_CR19","doi-asserted-by":"publisher","first-page":"20099","DOI":"10.1007\/s11042-017-4396-4","volume":"76","author":"B Huang","year":"2017","unstructured":"Huang, B., Liu, Z., Chen, J., et al.: Behavior pattern clustering in blockchain networks. Multimedia Tools Appl. 76(19), 20099\u201320110 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"9_CR20","unstructured":"Baumann, A., Fabian, B., Lischke, M.: Exploring the bitcoin network. WEBIST (1), 2014, 369\u2013374 (2014)"},{"key":"9_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/978-981-15-9129-7_45","volume-title":"Security and Privacy in Digital Economy","author":"M Shen","year":"2020","unstructured":"Shen, M., Duan, J., Shang, N., Zhu, L.: Transaction deanonymization in large-scale bitcoin systems via propagation pattern analysis. In: Yu, S., Mueller, P., Qian, J. (eds.) SPDE 2020. CCIS, vol. 1268, pp. 661\u2013675. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9129-7_45"}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8285-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:03:33Z","timestamp":1671840213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8285-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811982842","9789811982859"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8285-9_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}