Source:
Cuneyt Gurcan Akcora (cuneyt.akcora '@' umanitoba.ca) University of Manitoba, Canada
Yulia Gel (ygl '@' utdallas.edu) University of Texas at Dallas, USA
Murat kantarcioglu (muratk '@' utdallas.edu) University of Texas at Dallas, USA
Data Set Information:
We have downloaded and parsed the entire Bitcoin transaction graph from 2009 January to 2018 December. Using a time interval of 24 hours, we extracted daily transactions on the network and formed the Bitcoin graph. We filtered out the network edges that transfer less than B0.3, since ransom amounts are rarely below this threshold.
Ransomware addresses are taken from three widely adopted studies: Montreal, Princeton and Padua. Please see the BitcoinHeist article for references.
Attribute Information:
Features
address: String. Bitcoin address.
year: Integer. Year.
day: Integer. Day of the year. 1 is the first day, 365 is the last day.
length: Integer.
weight: Float.
count: Integer.
looped: Integer.
neighbors: Integer.
income: Integer. Satoshi amount (1 bitcoin = 100 million satoshis).
label: Category String. Name of the ransomware family (e.g., Cryptxxx, cryptolocker etc) or white (i.e., not known to be ransomware).
Data Type
Multivariate
Default Task
Classification, Regression, Clustering
Attribute Type
Integer
Published Year
2010
Area of Dataset
Computer
Missing Values
No
No. of Instances
2916697
No. of Attributes
10
| Data Type | Multivariate | Default Task | Classification, Regression, Clustering |
|---|---|---|---|
| Attribute Type | Integer | Published Year | 2010 |
| Area of Dataset | Computer | Missing Values | No |
| No. of Instances | 2916697 | No. of Attributes | 10 |
Sign in to join the discussion and post comments.
Sign in