{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:40Z","timestamp":1759332640324,"version":"3.40.5"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2023,1,23]]},"abstract":"<jats:p>Ransomware attacks are one of the most dangerous related crimes in the coin market. To increase the challenge of fighting the attack, early detection of ransomware seems necessary. In this article, we propose a high-performance Bitcoin transaction predictive system that investigates Bitcoin payment transactions to learn data patterns that can recognize and classify ransomware payments for heterogeneous bitcoin networks into malicious or benign transactions. The proposed approach makes use of three supervised machine learning methods to learn the distinctive patterns in Bitcoin payment transactions, namely, logistic regression (LR), random forest (RF), and Extreme Gradient Boosting (XGBoost). We evaluate these ML-based predictive models on the BitcoinHeist ransomware dataset in terms of classification accuracy and other evaluation measures such as confusion matrix, recall, and F1-score. It turned out that the experimental results recorded by the XGBoost model achieved an accuracy of 99.08%. As a result, the resulting model accuracy is higher than many recent state-of-the-art models developed to detect ransomware payments in Bitcoin transactions.<\/jats:p>","DOI":"10.1155\/2023\/6274260","type":"journal-article","created":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:50:21Z","timestamp":1674503421000},"page":"1-10","source":"Crossref","is-referenced-by-count":14,"title":["Machine Learning-Based Ransomware Classification of Bitcoin Transactions"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4699-6432","authenticated-orcid":true,"given":"Suleiman Ali","family":"Alsaif","sequence":"first","affiliation":[{"name":"Computer Department, Deanship of Preparatory Year and Supporting Studies, Imam Abdulrahman Bin Faisal University, Dammam 31441, Saudi Arabia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/3369752"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9991535"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/computers8040079"},{"volume-title":"The Application of Machine Learning in Bitcoin Ransomware Family Prediction","year":"2021","author":"S. Xu","key":"4"},{"first-page":"259","article-title":"A survey on preventing crypto ransomware using machine learning","author":"J. A. Abraham","key":"5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2016.2535718"},{"first-page":"34","article-title":"Evaluating user privacy in bitcoin","author":"E. Androulaki","key":"7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.3390\/fi5020237"},{"first-page":"1","article-title":"Bitconeview: visualization of flows in the bitcoin transaction graph","author":"G. Di Battista","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyx007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2896384"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"first-page":"618","article-title":"Tracking ransomware end-to-end","author":"D. Y. Huang","key":"13"},{"first-page":"1","article-title":"Behind closed doors: measurement and analysis of cryptolocker ransoms in bitcoin","author":"K. Liao","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2021.13506"},{"key":"16","first-page":"93","volume-title":"Leveraging machine learning techniques for windows ransomware network traffic detection","author":"O. Alhawi","year":"2018"},{"article-title":"Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain","year":"2019","author":"G. Akcora Cuneyt","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-020-00261-7"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-019-1004-8"},{"first-page":"198","article-title":"Aided selection of sampling methods for imbalanced data classification","author":"S. Deep","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3390\/s22041373"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2008.239"},{"key":"23","first-page":"2825","article-title":"Scikit-learn: machine learning in python","volume":"12","author":"P. Fabian","year":"2011","journal-title":"Journal of Machine Learning Research"},{"first-page":"233","article-title":"Detection of compatibility, proximity and expectancy of Bengali sentences using long short term memory","author":"A. H. Chowdhury","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/s1532-0464(03)00034-0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1504\/ijcat.2022.127810"},{"first-page":"785","article-title":"Xgboost: a scalable tree boosting system","author":"T. Chen","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.820"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.3390\/computers11110161"},{"first-page":"1","article-title":"Intrusion detection of multiple attack classes using a deep neural net ensemble","author":"S. A. Ludwig","key":"31"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc6040147"},{"first-page":"161","article-title":"Dynamic network anomaly detection system by using deep learning techniques","author":"P. Lin","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106630"},{"first-page":"1","article-title":"Analysis of bitcoin transactions to detect illegal transactions using convolutional neural networks","author":"K. Kolesnikova","key":"35"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6274260.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6274260.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2023\/6274260.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:50:23Z","timestamp":1674503423000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/acisc\/2023\/6274260\/"}},"subtitle":[],"editor":[{"given":"Babek","family":"Erdebilli","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1,23]]},"references-count":35,"alternative-id":["6274260","6274260"],"URL":"https:\/\/doi.org\/10.1155\/2023\/6274260","relation":{},"ISSN":["1687-9732","1687-9724"],"issn-type":[{"type":"electronic","value":"1687-9732"},{"type":"print","value":"1687-9724"}],"subject":[],"published":{"date-parts":[[2023,1,23]]}}}