Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Soumya ., Shreyasi Patra, Arham Saba, Pranshu Priyam, Prof. Roopa Banakar
DOI Link: https://doi.org/10.22214/ijraset.2023.52147
Certificate: View Certificate
Over the past few years, despite their vulnerability to market manipulation owing to limited liquidity, cryptocurrencies have attracted a lot of public attention and investment. More than $100 billion is currently traded on cryptocurrency exchanges each month, and individuals who are not necessarily experts in the field have begun purchasing these digital assets. A multi-modal technique is being utilised to identify and measure coordinated pump and dump scams that are carried out on bitcoin exchanges using social media platforms like Telegram. This strategy attempts to anticipate if a pump effort will be effective by evaluating a variety of parameters.
I. INTRODUCTION
The popularity of cryptocurrencies as a form of investment has increased lately but the absence of regulation and transparency in the sector has made it susceptible to market manipulation, particularly in the form of pump-and-dump schemes. A group of traders artificially inflate the price of a certain cryptocurrency by coordinating their purchases and disseminating false information about the asset's potential value. The traders sell their shares when the price hits a certain point, which causes the price to fall and leaves other investors with huge losses. The establishment of the well-known cryptocurrency Bitcoin (BTC) was a crucial milestone enabled by the advent of blockchain technology. Following the first debut of various new cryptocurrencies, trading platforms suffered significant price volatility. These price movements increased the attraction of cryptocurrencies by allowing some investors to earn significantly. Despite the fact that the bulk of investments are made in more well-known cryptocurrencies such as Bitcoin (BTC) and Ethereum (ETH), there are hundreds of additional smaller cryptocurrencies. The fraudulent "pump and dump" method of market manipulation is increasing the price of a particular investment that belongs to the manipulator and then selling it to other investors at a much higher price.
A. Problem Statement
The issues with bitcoin pump-and-dump schemes could significantly influence investors' financial well-being, particularly those who are new to the market or lack experience in discerning such fraudulent operations.
A few crucial questions are raised:
Traditional methods of detecting pump-and-dump schemes rely on the manual analysis of trading data and identifying patterns that indicate manipulation. This approach can be time-consuming and prone to errors.
The goal of this survey paper is to explore the use of deep learning models for detecting crypto pump-and-dump scams. The survey will analyze existing research on the topic and identify gaps in the current literature.
B. Objectives
II. PRIOR WORKS
III. DATA ACQUISITION AND PREPARATION
A. Data Acquisition
B. Data Preprocessing
IV. METHODOLOGY
A. System Architecture
Several crucial elements constitute the system structure for identifying and anticipating pump-and-dump scams in bitcoin via social media. Social media platforms are used by scammers to promote their fraudulent schemes and frequently to trick individuals into buying particular cryptocurrencies. The incorrect information in these fraudulent posts on social networks might convince people to invest in the aforementioned cryptocurrencies in the hopes of making quick money. The system then gets pertinent information through a programming interface, or API that gives users access to historical or real-time bitcoin data. Analysis and forecasting are based on this data.
Candidate elimination, a preprocessing method, is used to remove irrelevant or unneeded information from the received data. This improves the data so it can be used for more analysis. Next, a training-set and a testing-set are created from the preprocessed data. The predictive model is trained using the training set, and its performance is assessed using the testing set. To guarantee uniformity and comparability across various features or variables, normalisation and standardizarion are employed. This procedure aids in eliminating any biases or contradictions that might present in the data. A certain amount of prior data points are utilised as inputs to forecast the outcome since the standardised data is segmented into window-sized parts. Using this windowing method, the model can detect temporal patterns and dependencies. In order to feed the preprocessed and windowed data into the predictive model, more processing and preparation must be done. It entails rearranging the input into a sequence that the model can recognise and efficiently process. The produced data is utilised to assess the prediction model's effectiveness. This assessment determines how effectively the model can identify pump and dump schemes using the supplied data. The model is developed using training data, where it attempts to capture the fundamental dynamics of pump and dump schemes by learning from previous trends. The performance of the model is then evaluated using the evaluation data. The model's performance is subsequently determined using the evaluation dataset. To analyse the sequential and temporal components of the data, the system uses a special kind of deep learning
Model called Long Short-Term Memory (LSTM). Because LSTM models are effective at time-series analytic tasks, they may be used to anticipate pump and dump schemes. The LSTM model is tested and trained to look for potential spikes or other irregular patterns in the data that might be signs of a pump and dump scheme.
The model examines the input data to find any notable departures from predicted behaviour. An alert or warning is delivered to the appropriate people to advise them about the possible fraudulent conduct if the model is successful in identifying a pump or dump scam. If the model is unable to detect a fraud, more research or model improvement may be required. To forecast upcoming frauds, the system also uses the K-Nearest Neighbours (KNN) algorithm. KNN is a supervised machine learning method that classifies data points based on similarity criteria. The technology can forecast the possibility of upcoming pump and dump frauds by examining previous trends and parallels.
In general, this system architecture incorporates methodologies for data collection, preprocessing, model training, and predictive analysis to identify and anticipate pump and dump schemes in cryptocurrencies using social media.
B. LSTM Model Architecture
Recurrent neural networks (RNNs) of the LSTM variety are created to address the shortcomings of conventional RNNs in capturing long-term dependencies in sequential input. This is accomplished through the use of memory cells as well as the input gate, forget gate, and output gate—three gating mechanisms. Its unique structure makes it possible to identify long-term dependencies in sequential data. It is made up of LSTM units or cells that repeat and each of which has a specific set of parts and connections.
Current input (Xt) and the preceding hidden state (Ht-1) are combined with a sigmoid(σ) activation function. The sigmoid function's output, which has a range from 0 to 1, represents the importance or significance of each input element. The candidate values derived from the activation function of the tan hyperbolic (tanh) transformation applied to the current input (Xt) are multiplied by the outcome. The candidate values can be updated due to the non-linearity generated by the tanh function. Which data ought to be included in the cell's status is decided during this process.
2. Forget Gate: The forget gate determines which components of the prior state of a cell should be forgotten. A sigmoid() activation function is used after combining the previous hidden state with the present intake. The recall factor that represents every component in the previous state of a cell is represented by the sigmoid function's output, which ranges from 0 to 1. The result is element-wise multiplied by the preceding cell state, which aids in eliminating extraneous data.
3. Update Cell State (Ct): The outputs of the inputs from the input gate and forget gate are combined to update the state of the cell. The candidate state of the cell (C~t) and the previous cell state (Ct-1) are combined to form the updated cell state. The potential addition of fresh information to the cell state is represented by the candidate cell state. Based on the judgements made by the input gate, the latest values entered get added to the cells state. The decisions made by the forget gate determine whether components of the previous cell state are retained.
4. Output Gate: The hidden state (Ht) of the cell should be outputted based on the decisions made by the output gate. The result of an LSTM cell at a particular time step is called the hidden state, and it contains the pertinent data from the present input and previous inputs. Through the output gate, the cell state has an impact on it. It accepts as inputs the present intake (Xt) and the prior hidden state (Ht-1). The output gate linearly combines Xt and Ht-1 with a sigmoid activation function. It accepts as inputs the present intake (xt) and the prior hidden state (Ht-1). The output gate linearly combines xt and Ht-1 with a sigmoid activation function. To compress the values between -1 and 1, the updated cell state is run via the tanh activation function. The last hidden state (Ht) is produced by multiplying the output of the output gate by the tanh output.
C. Pump and dump Activities using LSTM classifier
To identify and categorise pump-and-dump operations in the bitcoin market, an LSTM classifier can be used. Pump-and-dump strategies include orchestrated purchasing and selling to artificially inflate the price of a cryptocurrency. The LSTM classifier makes use of historical price data, trade volume, order book data, and sentiment from social media to spot patterns related to pump-and-dump actions. To find patterns linked to pump-and-dump schemes, it makes use of historical price data, trade volumes, order book data, and social media sentiment. Collection of data, preprocessing, feature extraction, dataset preparation, creation of the LSTM model architecture, training, assessment, and prediction with an alarm system are all steps in the process.
By analyzing market data and employing machine learning techniques, the LSTM classifier can identify suspicious trading activities indicative of pump-and-dump schemes, thereby enabling informed decision-making and risk mitigation. Continuous monitoring and updates are essential to adapt the classifier to new market trends and evolving scam patterns.
D. Model Evaluation and Selection
Model evaluation is a crucial step in assessing the performance of an LSTM classifier for detecting pump-and-dump activities in the cryptocurrency market. The collected dataset is typically split into training and testing sets, with the former used to train the model and the latter used to evaluate its performance on unseen data. Various performance metrics, such as RMSE (Root Mean Square Error), R-squared, Mean Square Error (MSE), and Mean Absolute Error (MAE), are employed to measure the classifier's effectiveness. These metrics are commonly used for regression tasks, where the goal is to predict continuous numerical values.
V. RESULTS AND DISCUSSION
Insightful information on market manipulation was gleaned through an analysis of pump-and-dump behaviours in the Bitcoin market. Potential pump-and-dump events were visually identified using a graph showing the variations in the price of bitcoin over a certain time period. The price of bitcoin showed periods of abrupt and substantial price jumps on the graph, followed by periods of rapid falls, suggesting possible pump-and-dump actions. On the graph, the identified pump-and-dump occurrences were highlighted to show the precise time windows during which these manipulative behaviours took place. There were noticeable variations in trade volumes and liquidity during the detected pump-and-dump episodes, which pointed to unusual market behaviour. These anomalies provide additional evidence of planned pricing manipulation. The graph's analysis revealed that Bitcoin pump-and-dump actions had place over very brief periods of time. The sharp rise and subsequent decline in prices over a short period of time were signs of a pump phase, followed by a dump phase in which market manipulators dumped their assets at inflated prices, resulting in substantial losses for unwary investors. A better knowledge of the dynamics of market manipulation in Bitcoin is possible thanks to the ability to visually watch the pump-and-dump activities and pinpoint the precise time periods. These findings highlight the significance of diligent surveillance and detection of such operations in order to safeguard investors and preserve the market's integrity.
VI. ACKNOWLEDGEMENT
We would like to convey our heartfelt appreciation to everyone who has contributed important support and assistance during the development of this project. We would like to express our deepest gratitude to Dr. Kamalakshi Naganna, Professor and Head, Department of Computer Science and Engineering, Sapthagiri College of Engineering, and our project guide, Prof. Roopa Banakar, Professor, Department of Computer Science and Engineering, Sapthagiri College of Engineering, for their continual advice, support, and encouragement during the project. Their important opinions and suggestions have helped shape our project. Finally, we are grateful to our friends and family for their continual encouragement and support.
VI. CONCLUSION In conclusion, assessing bitcoin pump and dump schemes is essential for avoiding losses and safeguarding investors. These frauds may be efficiently identified and avoided by utilising cutting-edge technology like data analytics, machine learning, and blockchain analysis. Investors may choose which currencies to invest in and which ones to avoid by using LSTM models to analyse a variety of coins. To remain on top of the most recent scams and safeguard investors from possible losses, cooperation between investors, regulators, and technological specialists is essential. To preserve the integrity of the cryptocurrency market and make sure it continues to be a dependable and trustworthy investment alternative, the examination of pump and dump frauds in cryptocurrencies is crucial. Future efforts to combat cryptocurrency pump-and-dump scams will focus on improving data analysis methods, creating real-time monitoring systems, bolstering regulatory frameworks and enforcement, promoting investor education and awareness, putting market surveillance measures in place, and investigating blockchain technology options. By concentrating on these areas, the goal is to enhance pump-and-dump activity detection, prevention, and mitigation, providing investors and stakeholders with a more safe and reliable cryptocurrency market.
[1] M. La Morgia, A. Mei, F. Sassi and J. Stefa, \"Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations,\" 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 2020, pp. 1-9, doi: 10.1109/ICCCN49398.2020.9209660. [2] M. Bartoletti, S. Lande, A. Loddo, L. Pompianu and S. Serusi, \"Cryptocurrency Scams: Analysis and Perspectives,\" in IEEE Access, vol. 9, pp. 148353-148373, 2021, doi: 10.1109/ACCESS.2021.3123894. [3] Fratri?, P., Sileno, G., Klous, S. et al. Manipulation of the Bitcoin market: an agent-based study. Financ Innov 8, 60 (2022). doi.org/10.1186/40854-022-00364-3. [4] Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti (Member, IEEE), Stefano Cresci (Member, IEEE), Maurizio Tesconi and Emilio Ferrara (Senior Member, IEEE), “Charting the Landscape of Online Cryptocurrency Manipulation,” IEEE Access, Vol. 8, pp. 113230 - 113245, Jun. 2020. [5] Ihsan Tolga Medeni, Mehmet Serdar Guzel, Firat Akba (Member, IEEE) and Iman Askerzade , “Manipulator Detection in Cryptocurrency Markets Based on Forecasting Anomalies,” IEEE Access, Vol. 9, pp. 108819 - 108831, Jul. 2021 [6] Antón Lorenzo García, Ana Fernández Vilas and Rebeca P. Díaz Redondo, “The Irruption of Cryptocurrencies Into Twitter Cashtags: A Classifying Solution,” IEEE Access, Vol. 9, pp. 32698 - 32713, Feb. 2020. [7] Emad Badawi and Guy-Vincent Jourdan, “Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review,” IEEE Access, Vol. 8, pp. 200021 - 200037, Oct. 2020. [8] Weili Chen, YueJin Xu, Zibin Zheng, Yuren Zhou, Jianxun Eileen Yang and Jing Bian, “Detecting Pump & Dump Schemes” on Cryptocurrency Market Using An Improved Apriori Algorithm,” 2019 IEEE International Conference on Service-Oriented System Engineering, May. 2019.
Copyright © 2023 Soumya ., Shreyasi Patra, Arham Saba, Pranshu Priyam, Prof. Roopa Banakar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET52147
Publish Date : 2023-05-12
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here