{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:06:07Z","timestamp":1776099967465,"version":"3.50.1"},"reference-count":61,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>With the growing popularity of cryptocurrencies, detecting potential market manipulation and fraudulent activities has become crucial for maintaining market integrity. In this study, we aim to detect anomalous Bitcoin transactions using an integrated approach by combining clustering techniques with statistical outlier detection. More specifically, anomalies were detected using three approaches: a distance-based method, flagging points with distances greater than the 95th percentile from their cluster centers; a statistical method, identifying transactions with any feature having an absolute Z-score greater than 3; and a hybrid approach, where transactions flagged by either method were considered anomalous. Using sample subset Bitcoin transaction data from 2015, our results showed that the combined approach was able to achieve the best performance with a total of 6492 (6.61%) detected anomalous transactions out of a total of 98,151 transactions.<\/jats:p>","DOI":"10.3390\/informatics12020043","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T06:10:13Z","timestamp":1745561413000},"page":"43","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Leveraging K-Means Clustering and Z-Score for Anomaly Detection in Bitcoin Transactions"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4346-7340","authenticated-orcid":false,"given":"Jinish","family":"Patel","sequence":"first","affiliation":[{"name":"Department of Computing and Security, College of Engineering and Science, Slippery Rock University, Slippery Rock, PA 16057, USA"}]},{"given":"Joseph","family":"Reiner","sequence":"additional","affiliation":[{"name":"Department of Computing and Security, College of Engineering and Science, Slippery Rock University, Slippery Rock, PA 16057, USA"}]},{"given":"Brenden","family":"Stilwell","sequence":"additional","affiliation":[{"name":"Department of Computing and Security, College of Engineering and Science, Slippery Rock University, Slippery Rock, PA 16057, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6894-0192","authenticated-orcid":false,"given":"Abdullah","family":"Wahbeh","sequence":"additional","affiliation":[{"name":"Department of Computing and Security, College of Engineering and Science, Slippery Rock University, Slippery Rock, PA 16057, USA"}]},{"given":"Raed","family":"Seetan","sequence":"additional","affiliation":[{"name":"Department of Computing and Security, College of Engineering and Science, Slippery Rock University, Slippery Rock, PA 16057, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S., and Ishfaq, M. (2022). Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14.","DOI":"10.3390\/fi14110341"},{"key":"ref_2","unstructured":"Pilkington, M. (2025, March 06). Chapter 11: Blockchain Technology: Principles and Applications. Available online: https:\/\/www.elgaronline.com\/edcollchap\/edcoll\/9781784717759\/9781784717759.00019.xml."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.1109\/TETC.2019.2949510","article-title":"Blockchain Mutability: Challenges and Proposed Solutions","volume":"9","author":"Politou","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3187","DOI":"10.1049\/iet-com.2019.0194","article-title":"Blockchain in internet-of-things: A necessity framework for security, reliability, transparency, immutability and liability","volume":"13","author":"Tariq","year":"2019","journal-title":"IET Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103035","DOI":"10.1016\/j.jnca.2021.103035","article-title":"A survey of consensus algorithms in public blockchain systems for crypto-currencies","volume":"182","author":"Ferdous","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/TSC.2020.3038641","article-title":"Blockchain Security: A Survey of Techniques and Research Directions","volume":"15","author":"Leng","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","article-title":"A Comprehensive Review of Blockchain Consensus Mechanisms","volume":"9","author":"Lashkari","year":"2021","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yan, S. (2022, January 15\u201316). Analysis on Blockchain Consensus Mechanism Based on Proof of Work and Proof of Stake. Proceedings of the 2022 International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI), Zakopane, Poland.","DOI":"10.1109\/ICDACAI57211.2022.00098"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wu, C., and Wang, X. (2020, January 5). Overview of Blockchain Consensus Mechanism. Proceedings of the 2020 2nd International Conference on Big Data Engineering, BDE \u201920, New York, NY, USA.","DOI":"10.1145\/3404512.3404522"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","article-title":"Blockchain smart contracts: Applications, challenges, and future trends","volume":"14","author":"Khan","year":"2021","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Mohanta, B.K., Panda, S.S., and Jena, D. (2018, January 10\u201312). An Overview of Smart Contract and Use Cases in Blockchain Technology. Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India.","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"ref_13","first-page":"39","article-title":"Cryptocurrencies and the blockchain","volume":"36","author":"Tredinnick","year":"2019","journal-title":"Bus. Inf. Rev."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Amarasinghe, N., Boyen, X., and McKague, M. (2019, January 29\u201331). A Survey of Anonymity of Cryptocurrencies. Proceedings of the Australasian Computer Science Week Multiconference, ACSW \u201919, New York, NY, USA.","DOI":"10.1145\/3290688.3290693"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1353\/eca.2022.0014","article-title":"Cryptocurrencies and Decentralized Finance (DeFi)","volume":"2022","author":"Makarov","year":"2022","journal-title":"Brook. Pap. Econ. Act."},{"key":"ref_16","first-page":"102199","article-title":"The state of play of blockchain technology in the financial services sector: A systematic literature review","volume":"54","author":"Ali","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","article-title":"Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.comcom.2023.01.018","article-title":"A comparative study on consensus mechanism with security threats and future scopes: Blockchain","volume":"201","author":"Yadav","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gracy, M., and Rebecca Jeyavadhanam, B. (2021, January 18\u201319). A Systematic Review of Blockchain-Based System: Transaction Throughput Latency and Challenges. Proceedings of the 2021 International Conference on Computational Intelligence and Computing Applications (ICCICA), Nagpur, India.","DOI":"10.1109\/ICCICA52458.2021.9697142"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.dcan.2022.06.017","article-title":"An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions","volume":"9","author":"Kohli","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1108\/JFRC-08-2016-0068","article-title":"Regulatory issues in blockchain technology","volume":"25","author":"Yeoh","year":"2017","journal-title":"J. Financ. Regul. Compliance"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1108\/JMB-11-2021-0051","article-title":"Cryptocurrency: Usability perspective versus volatility threat","volume":"2","author":"Khan","year":"2021","journal-title":"J. Money Bus."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kayani, U., and Hasan, F. (2024). Unveiling Cryptocurrency Impact on Financial Markets and Traditional Banking Systems: Lessons for Sustainable Blockchain and Interdisciplinary Collaborations. J. Risk Financ. Manag., 17.","DOI":"10.3390\/jrfm17020058"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Lorenz, J., Silva, M.I., Apar\u00edcio, D., Ascens\u00e3o, J.T., and Bizarro, P. (2021, January 15\u201316). Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. Proceedings of the First ACM International Conference on AI in Finance, in ICAIF \u201920, New York, NY, USA.","DOI":"10.1145\/3383455.3422549"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s12525-023-00654-3","article-title":"Detecting anomalous cryptocurrency transactions: An AML\/CFT application of machine learning-based forensics","volume":"33","author":"Pocher","year":"2023","journal-title":"Electron. Markets"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3619","DOI":"10.1109\/TNSM.2022.3173598","article-title":"A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking","volume":"19","author":"Kim","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/COMST.2022.3205643","article-title":"Anomaly Detection in Blockchain Networks: A Comprehensive Survey","volume":"25","author":"Rehmani","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yahia, A., Mouhssine, Y., Elalaoui, A., and Ouatik Elalaoui, S. (2024, January 17\u201318). Leveraging Machine Learning for Anomaly Detection Methods in Cryptocurrency: A Data-Driven Study. Proceedings of the 2024 10th International Conference on Optimization and Applications (ICOA), Almer\u00eda, Spain.","DOI":"10.1109\/ICOA62581.2024.10754457"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"109194","DOI":"10.1016\/j.compeleceng.2024.109194","article-title":"Research on blockchain abnormal transaction detection technology combining CNN and transformer structure","volume":"116","author":"Wang","year":"2024","journal-title":"Comput. Electr. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Tanwar, S., Wierzchon, S.T., Singh, P.K., Ganzha, M., and Epiphaniou, G. (2022, January 21\u201322). Graph Neural Network-Based Anomaly Detection in Blockchain Network. Proceedings of the International Conference on Computing, Communications, and Cyber-Security, Delhi, India.","DOI":"10.1007\/978-981-99-1479-1"},{"key":"ref_31","first-page":"8","article-title":"Combining Multiple Classifiers using Ensemble Method for Anomaly Detection in Blockchain Networks: A Comprehensive Review","volume":"13","author":"Hisham","year":"2022","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","article-title":"Survey on Anomaly Detection using Data Mining Techniques","volume":"60","author":"Agrawal","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Kogan, J., Nicholas, C., and Teboulle, M. (2006). A Survey of Clustering Data Mining Techniques. Grouping Multidimensional Data: Recent Advances in Clustering, Springer.","DOI":"10.1007\/3-540-28349-8"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"123487","DOI":"10.1016\/j.eswa.2024.123487","article-title":"Optimizing Time-Series forecasting using stacked deep learning framework with enhanced adaptive moment estimation and error correction","volume":"249","author":"Varshney","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Sayadi, S., Ben Rejeb, S., and Choukair, Z. (2019, January 24\u201328). Anomaly Detection Model Over Blockchain Electronic Transactions. Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Baek, H., Oh, J., Kim, C.Y., and Lee, K. (2019, January 2\u20135). A Model for Detecting Cryptocurrency Transactions with Discernible Purpose. Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia.","DOI":"10.1109\/ICUFN.2019.8806126"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.3390\/make5040084","article-title":"Active Learning in the Detection of Anomalies in Cryptocurrency Transactions","volume":"5","author":"Cunha","year":"2023","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"e192","DOI":"10.1002\/spy2.192","article-title":"Anomaly detection in blockchain using network representation and machine learning","volume":"5","author":"Martin","year":"2022","journal-title":"Secur. Priv."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Elmougy, Y., and Manzi, O. (2021, January 11\u201313). Anomaly Detection on Bitcoin, Ethereum Networks Using GPU-accelerated Machine Learning Methods. Proceedings of the 2021 31st International Conference on Computer Theory and Applications (ICCTA), Alexandria, Egypt.","DOI":"10.1109\/ICCTA54562.2021.9916625"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Shayegan, M.J., Sabor, H.R., Uddin, M., and Chen, C.-L. (2022). A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network. Symmetry, 14.","DOI":"10.3390\/sym14020328"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2","DOI":"10.47738\/jcrb.v1i2.17","article-title":"Anomaly Detection in Blockchain Transactions within the Metaverse Using Anomaly Detection Techniques","volume":"1","author":"Henderi","year":"2024","journal-title":"J. Curr. Res. Blockchain"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhao, K., Dong, G., and Bian, D. (2023). Detection of Illegal Transactions of Cryptocurrency Based on Mutual Information. Electronics, 12.","DOI":"10.3390\/electronics12071542"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"24","DOI":"10.47738\/ijrm.v2i1.20","article-title":"Anomaly Detection in Open Metaverse Blockchain Transactions Using Isolation Forest and Autoencoder Neural Networks","volume":"2","author":"Buchdadi","year":"2025","journal-title":"Int. J. Res. Metaverse"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"91075","DOI":"10.1109\/ACCESS.2024.3419152","article-title":"Graph Anomaly Detection with Disentangled Prototypical Autoencoder for Phishing Scam Detection in Cryptocurrency Transactions","volume":"12","author":"Kang","year":"2024","journal-title":"IEEE Access"},{"key":"ref_45","unstructured":"Badawi, A.A., and Al-Haija, Q.A. (2021, January 21\u201323). Detection of money laundering in bitcoin transactions. Proceedings of the 4th Smart Cities Symposium (SCS 2021), Manama, Bahrain."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"98115","DOI":"10.1109\/ACCESS.2023.3313448","article-title":"Anomaly VAE-Transformer: A Deep Learning Approach for Anomaly Detection in Decentralized Finance","volume":"11","author":"Song","year":"2023","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kim, J., Nakashima, M., Fan, W., Wuthier, S., Zhou, X., Kim, I., and Chang, S.-Y. (2021, January 3\u20136). Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia.","DOI":"10.1109\/ICBC51069.2021.9461119"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Snigdha, K., Reddy, P.S.N., Hema, D., and Gayathri, S. (2024, January 9\u201310). BitPredict: End-to-End Context-Aware Detection of Anomalies in Bitcoin Transactions using Stack Model Network. Proceedings of the 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India.","DOI":"10.1109\/ACCAI61061.2024.10602116"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.47738\/jcrb.v2i1.24","article-title":"Discovering Co-Occurrence Patterns Among Blockchain Address Categories Using the FP-Growth Association Mining Algorithm","volume":"2","author":"Lenus","year":"2025","journal-title":"J. Curr. Res. Blockchain"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"70","DOI":"10.47738\/jcrb.v1i1.12","article-title":"Unsupervised Anomaly Detection in Digital Currency Trading: A Clustering and Density-Based Approach Using Bitcoin Data","volume":"1","author":"Hariguna","year":"2024","journal-title":"J. Curr. Res. Blockchain"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Cano, V., and Jurado, F. (2025). Fraud Detection in Cryptocurrency Networks\u2014An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers. Future Internet, 17.","DOI":"10.3390\/fi17010044"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"17589","DOI":"10.1109\/JIOT.2024.3360039","article-title":"Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory","volume":"11","author":"Han","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_53","unstructured":"Tigani, J., and Naidu, S. (2014). Google BigQuery Analytics, John Wiley & Sons."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"106855","DOI":"10.1016\/j.asoc.2020.106855","article-title":"Standardized Variable Distances: A distance-based machine learning method","volume":"98","author":"Elen","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_55","first-page":"2","article-title":"Performances of K-Means Clustering Algorithm with Different Distance Metrics","volume":"30","author":"Ghazal","year":"2021","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Olson, K.L., Bonetti, M., Pagano, M., and Mandl, K.D. (2005). Real time spatial cluster detection using interpoint distances among precise patient locations. BMC Med. Inform. Decis. Mak., 5.","DOI":"10.1186\/1472-6947-5-19"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Kathiresan, V., and Sumathi, P. (2012, January 10\u201312). An efficient clustering algorithm based on Z-Score ranking method. Proceedings of the 2012 International Conference on Computer Communication and Informatics, Coimbatore, India.","DOI":"10.1109\/ICCCI.2012.6158779"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"94520","DOI":"10.1109\/ACCESS.2019.2928628","article-title":"Rapid Transformer Health State Recognition Through Canopy Cluster-Merging of Dissolved Gas Data in High-Dimensional Space","volume":"7","author":"Qi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1548","DOI":"10.1515\/cclm-2023-0835","article-title":"Assessment of accuracy of laboratory testing results, relative to peer group consensus values in external quality control, by bivariate z-score analysis: The example of D-Dimer","volume":"62","author":"Meijer","year":"2024","journal-title":"Clin. Chem. Lab. Med."},{"key":"ref_60","first-page":"124","article-title":"The Mystery of the Z-Score","volume":"4","author":"Curtis","year":"2018","journal-title":"Aorta"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"012017","DOI":"10.1088\/1757-899X\/336\/1\/012017","article-title":"Integration K-Means Clustering Method and Elbow Method for Identification of The Best Customer Profile Cluster","volume":"336","author":"Syakur","year":"2018","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/2\/43\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:21:24Z","timestamp":1760030484000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/2\/43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":61,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["informatics12020043"],"URL":"https:\/\/doi.org\/10.3390\/informatics12020043","relation":{},"ISSN":["2227-9709"],"issn-type":[{"value":"2227-9709","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,25]]}}}