Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
B
Blockchain Forensics using OSINT and Graph Temporal Logic
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Mohamed feroz khan D
Blockchain Forensics using OSINT and Graph Temporal Logic
Commits
d10e64cf
Commit
d10e64cf
authored
1 year ago
by
Mohamed feroz khan D
Browse files
Options
Downloads
Patches
Plain Diff
Syncing with Github project repo
parent
0231c9ed
Branches
Branches containing commit
No related tags found
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
README.md
+26
-1
26 additions, 1 deletion
README.md
with
26 additions
and
1 deletion
README.md
+
26
−
1
View file @
d10e64cf
# Blockchain Forensics using
OSINT and
Graph Temporal Logic 
# Blockchain Forensics using Graph Temporal Logic 






<br/>






<br/>




...
@@ -8,6 +8,31 @@
...
@@ -8,6 +8,31 @@
## Abstract
## Abstract
Detection of Illegal and Malicious accounts and transactions in Blockchain through ev-
idences collected from blockchain (on-chain) and related sources (off-chain) by Open
Source Intelligence (OSINT) and analysis through Graph Temporal Properties. Blockchain
is a decentralized computing distributed ledger platform that enables us to store im-
mutable transactions. In an open and transparent system, it makes logical decisions
involving several stakeholders. In this paper, we are compiling a list of addresses that
have been reported on social media, and using the information we have gathered, we will
check the blockchain explorer and extract the address along with the transaction’s date,
time, and amount. This procedure is referred to as being “on-chain.” With the gathered
information, we create a dataset and conduct Off-chain Open Source Intelligence (OS-
INT) on the addresses to see whether they have appeared somewhere else online, such as
forums, Wikileaks, or other websites.
With the use of OSINT, we will utilise our techniques to determine the wallet address
of that user, and we will then use Graph Temporal Properties to examine the information
we have gathered. In Graph Temporal properties, we are uploading the dataset that we
created. When the graph gets executed, we will have an idea of how many times the
malicious address made contact with other collected addresses, and here we can find the
neighborhood stability and attractive for every address that we gave in the temporal
graph. Here we have to take Graph Temporal for the malicious address per day, week,
and month. Using the temporal graph, we can determine which addresses have the most
communication with the malicious account, we will filter those addresses and do both Off-
chain and On-chain Open Source Intelligence on those addresses. If any of these address
identities are disclosed on the internet, we can readily determine what the malicious
account conducts, such as fraud, ransomware, silk route, and so on.
## Architecture Diagram
## Architecture Diagram
## Results
## Results
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment