transfer trajectories
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 6)

H-INDEX

9
(FIVE YEARS 0)

2022 ◽  
Vol 16 (2) ◽  
pp. 1-29
Author(s):  
Kai Wang ◽  
Jun Pang ◽  
Dingjie Chen ◽  
Yu Zhao ◽  
Dapeng Huang ◽  
...  

Exploiting the anonymous mechanism of Bitcoin, ransomware activities demanding ransom in bitcoins have become rampant in recent years. Several existing studies quantify the impact of ransomware activities, mostly focusing on the amount of ransom. However, victims’ reactions in Bitcoin that can well reflect the impact of ransomware activities are somehow largely neglected. Besides, existing studies track ransom transfers at the Bitcoin address level, making it difficult for them to uncover the patterns of ransom transfers from a macro perspective beyond Bitcoin addresses. In this article, we conduct a large-scale analysis of ransom payments, ransom transfers, and victim migrations in Bitcoin from 2012 to 2021. First, we develop a fine-grained address clustering method to cluster Bitcoin addresses into users, which enables us to identify more addresses controlled by ransomware criminals. Second, motivated by the fact that Bitcoin activities and their participants already formed stable industries, such as Darknet and Miner , we train a multi-label classification model to identify the industry identifiers of users. Third, we identify ransom payment transactions and then quantify the amount of ransom and the number of victims in 63 ransomware activities. Finally, after we analyze the trajectories of ransom transferred across different industries and track victims’ migrations across industries, we find out that to obscure the purposes of their transfer trajectories, most ransomware criminals (e.g., operators of Locky and Wannacry) prefer to spread ransom into multiple industries instead of utilizing the services of Bitcoin mixers. Compared with other industries, Investment is highly resilient to ransomware activities in the sense that the number of users in Investment remains relatively stable. Moreover, we also observe that a few victims become active in the Darknet after paying ransom. Our findings in this work can help authorities deeply understand ransomware activities in Bitcoin. While our study focuses on ransomware, our methods are potentially applicable to other cybercriminal activities that have similarly adopted bitcoins as their payments.


2019 ◽  
Vol 364 (12) ◽  
Author(s):  
Yongfei Gao ◽  
Zhaokui Wang ◽  
Yulin Zhang

2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Qingguo Liu ◽  
Xinxue Liu ◽  
Jian Wu

On the conditions that the spacecraft engine is in finite thrust mode and the maneuver time is given, it takes a long time to compute the minimum duration transfer trajectories of space-to-ground vehicles, which is mainly because the initial values of the adjoint variables involved in the optimization model have no definite physical meanings and the model is sensitive to them. In order to develop space-to-ground transfer trajectory programmes in real time in an uncertain environment for the decision makers, we propose a fast method for computing the minimum duration transfer trajectories of space-to-ground vehicles with the given position of the landing point and the arbitrary maneuver point. First, the optimization model based on the hybrid method is established to compute the minimum duration transfer trajectory. Then, the region composed of maneuverable points is gridded and the initial values of the adjoint variables and the values of partial state variables of the minimum duration transfer trajectories at all gridded points are computed and saved to a database. Finally, the predicted values of the initial values of the adjoint variables and the values of partial state variables at any maneuver point within the region composed of maneuverable points are computed by using a binary cubic interpolation method. Finally, the minimum duration transfer trajectory is obtained by the hybrid method which takes the neighborhood of the predicted values as the search ranges of the initial values of the adjoint variables and the values of partial state variables. Simulation results demonstrate that the proposed method, which requires only 2.93% of the computational time of the hybrid method, can improve substantially the computational time of the minimum duration transfer trajectory of a space-to-ground vehicle under the guarantee of ensuring accuracy. The methodology of converting the time domain into the space domain is well applied in this paper.


Sign in / Sign up

Export Citation Format

Share Document