
A Survey on Anti-Money Laundering Techniques in Blockchain Systems
Leyuan Liu, Xiangye Li, Tian Lan, Yakun Cheng, Wei Chen, Zhixin Li, Sheng Cao, Weili Han, Xiaosong Zhang, Hongfeng Chai
A Survey on Anti-Money Laundering Techniques in Blockchain Systems
As the global financial landscape undergoes profound transformation, the blockchain technology has emerged as a cornerstone of Web 3.0 finance and a pivotal frontier in financial technology innovation. However, its decentralized and pseudonymous nature has also been exploited by malicious actors to circumvent regulatory oversight, facilitate money laundering, and conduct other illicit financial activities, posing substantial risks to both national and global financial security. Consequently, there is an urgent need to systematically assess the current progress in anti-money laundering (AML) research, anticipate future directions in blockchain-based AML technologies, and develop effective countermeasures to mitigate the evolving financial security challenges associated with blockchain applications. This study provides a comprehensive review of AML research in blockchain systems, examining the foundational AML frameworks, including traditional AML models and blockchain-based money laundering methodologies. It categorizes existing AML techniques into three primary approaches: rule-based methods, such as transaction parameter threshold setting, address-entity association analysis, and cross-chain association analysis; machine learning-based approaches, including support vector machines, logistic regression, decision trees, random forests, k-means clustering, and combining off-chain information; and deep learning-based methodologies, encompassing convolutional neural networks, recurrent neural networks, graph neural networks, and transformer-based models. Furthermore, this study discusses the practical applications of these techniques and reviews commonly used datasets that support AML research. Looking ahead, the advancement of AML technologies in blockchain systems necessitates progress in several critical areas: the construction of AML datasets capable of addressing data imbalance and annotation uncertainty, development of trusted AML algorithms, design of detection mechanisms for covert financial activities, and formulation of privacy-preserving yet regulation-compliant AML solutions. Strengthening these capabilities will enhance the effectiveness of AML frameworks within blockchain ecosystems and contribute to the secure and sustainable development of the digital economy.
anti-money laundering / blockchain system / machine learning / deep learning / data set / Web 3.0
[1] |
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system [EB/OL]. [2025-02-15]. https://courses.csail.mit.edu/6.857/2015/files/L07-nakamoto-bitcoin-a-peer-to-peer-electronic-cash-system.pdf.
|
[2] |
Ethereum white paper [EB/OL]. [2025-02-15]. https://ethereum.org/en/whitepaper/.
|
[3] |
DApps: What Web 3.0 looks like [EB/OL]. [2025-02-15]. https://gavwood.com/dappsweb3.html.
|
[4] |
Staff E. Blockchains: The great chain of being sure about things[J]. The Economist, 2016, 18(7): 1‒5.
|
[5] |
Bonneau J, Miller A, Clark J, et al. SoK [R]. San Jose: Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015.
|
[6] |
CoinMarketCap. According to CMC H1 2024 [EB/OL]. (2024-07-15)[2024-12-11]. https://coinmarketcap.com/academy/article/according-to-cmc-2024-h1
|
[7] |
慢雾科技. 上半年区块链安全与反洗钱报告 [EB/OL] (2024-07-01)[2024-12-11]. https://www.slowmist.com/report/first-half-of-the-2024-report(CN).pdf.
SLOWMIST. Blockchain security and anti-money laundering report for H1 2024 [EB/OL]. (2024-07-01)[2024-12-11]. https://www.slowmist.com/report/first-half-of-the-2024-report(CN).pdf.
|
[8] |
United Nations convention against illicit traffic in narcotic drugs and psychotropic substances, 1988 [EB/OL]. [2025-02-15]. https://www.unodc.org/pdf/convention_1988_en.pdf.
|
[9] |
International Monetary Fund. 2023 review of the fund’s anti-money laundering and combating the financing of terrorism strategy [EB/OL]. (2023-12-05)[2025-02-15]. https://www.imf.org/en/Publications/Policy-Papers/Issues/2023/12/05/2023-Review-of-The-Funds-Anti-Money-Laundering-and-Combating-The-Financing-of-Terrorism-542015.
|
[10] |
Jullum M, Løland A, Huseby R B, et al. Detecting money laundering transactions with machine learning [J]. Journal of Money Laundering Control, 2020, 23(1): 173‒186.
|
[11] |
慢雾科技. 2024区块链安全与反洗钱年度报告 [EB/OL]. [2025-02-15]. https://www.slowmist.com/report/2024-Blockchain-Security-and-AML-Annual-Report(CN).pdf.
SLOMIST. 2024 blockchain security and AML annual report [EB/OL]. [2025-02-15]. https://www.slowmist.com/report/2024-Blockchain-Security-and-AML-Annual-Report(CN).pdf.
|
[12] |
United States Congress. Bank secrecy act: An overview of key provisions and issues [R]. Washington DC: U.S. Department of the Treasury, Financial Crimes Enforcement Network, 1990.
|
[13] |
Financial instruments and exchange act (No. 25 of 1948) [EB/OL]. [2025-02-15]. https://www.fsa.go.jp/common/law/fie01.pdf.
|
[14] |
中华人民共和国反洗钱法 [EB/OL]. [2025-02-12]. http://www.pbc.gov.cn/fxqzhongxin/3558093/3558113/5586756/index.html.
Anti-money laundering law of the People’s Republic of China [EB/OL]. [2025-02-12]. http://www.pbc.gov.cn/fxqzhongxin/3558093/3558113/5586756/index.html.
|
[15] |
Chen Z Y, Van Khoa L D, Teoh E N, et al. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review [J]. Knowledge and Information Systems, 2018, 57(2): 245‒285.
|
[16] |
Tiwari M, Gepp A, Kumar K. A review of money laundering literature: The state of research in key areas [J]. Pacific Accounting Review, 2020, 32(2): 271‒303.
|
[17] |
Alsuwailem A A S, Saudagar A K J. Anti-money laundering systems: A systematic literature review [J]. Journal of Money Laundering Control, 2020, 23(4): 833‒848.
|
[18] |
Chen J. What is money laundering [EB/OL]. (2024-06-24)[2025-02-15]. https://www.investopedia.com/terms/m/moneylaundering.asp.
|
[19] |
Albrecht C, Duffin K M, Hawkins S, et al. The use of cryptocurrencies in the money laundering process [J]. Journal of Money Laundering Control, 2019, 22(2): 210‒216.
|
[20] |
Trozze A, Davies T, Kleinberg B. Of degens and defrauders: Using open-source investigative tools to investigate decentralized finance frauds and money laundering [J]. Forensic Science International: Digital Investigation, 2023, 46: 301575.
|
[21] |
Pertsev A, Semenov R, Storm R. Tornado cash privacy solution version 1.4 [EB/OL]. (2019-12-17)[2025-02-15]. https://berkeley-defi.github.io/assets/material/Tornado%20Cash%20Whitepaper.pdf.
|
[22] |
Giannoni C, Medda F. Unlocking transparency: Harnessing blockchain for anti-money laundering in alternative assets. The case of fine art and real estate [J]. SSRN Electronic Journal, 2023: 4662355.
|
[23] |
Monero. CryptoNote v 2.0 [EB/OL]. (2013-10-17)[2025-02-15]. https://github.com/monero-project/research-lab/blob/master/whitepaper/whitepaper.pdf
|
[24] |
Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles [J]. Journal of Cryptology, 2009, 22: 114‒138
|
[25] |
Noether S, MacKenzie A, Research Lab T M. Ring confidential transactions [J]. Ledger, 2016, 1: 1‒18.
|
[26] |
WeBank. WeBank leads in financial performance and application of AI and blockchain technologies [EB/OL]. (2021-08-04)[2025-02-15]. https://www.theasianbanker.com/updates-and-articles/webank-recorded-best-financial-growth-among-peer-banks-with-excellent-digital-service.
|
[27] |
Ant Financial. Ant financial—A global leading techfin company [EB/OL]. (2019-11-13)[2025-02-15]. https://data.alibabagroup.com/ecms-files/1532295521/e263ce74-7a13-44d7-8359-4399b9f7eb81.pdf.
|
[28] |
Celer Network. Celer network: Bring Internet scale to every blockchain [EB/OL]. (2018-6-15)[2025-02-15]. https://celer.network/doc/CelerNetwork-Whitepaper.pdf.
|
[29] |
Gonzálvez-Gallego N, Pérez-Cárceles M C. Does goodness of governance dissuade citizens from using cryptocurrencies? [J]. Economics & Sociology, 2021, 14(1): 11‒27.
|
[30] |
Saiedi E, Broström A, Ruiz F. Global drivers of cryptocurrency infrastructure adoption [J]. Small Business Economics, 2021, 57(1): 353‒406.
|
[31] |
Röscheisen M, Baldonado M, Chang K, et al. The Stanford infobus and its service layers: Augmenting the Internet with higher-level information management protocols [EB/OL]. (1997-08-08)[2025-02-15]. http://infolab.stanford.edu/pub/papers/augmenting.pdf#:~:text=In%20this%20paper%2C%20we%20survey%20the%20design%20of,metadata%20%28SMA%29%2C%20search%20%28STARTS%29%2C%20payment%20%28UPAI%29%2C%20and%20r.
|
[32] |
Khanuja H K, Adane D S. Forensic analysis for monitoring database transactions [R]. Delhi: Security in Computing and Communications, 2014.
|
[33] |
Lin D, Wu J J, Yu Y M, et al. DenseFlow: Spotting cryptocurrency money laundering in ethereum transaction graphs [R]. New York: The ACM Web Conference 2024, 2024.
|
[34] |
Grinberg R. Bitcoin: An innovative alternative digital currency [EB/OL]. (2011-11-11)[2025-02-15]. https://sites.cs.ucsb.edu/~rich/class/cs293b-cloud/papers/bitcoin.legal.pdf.
|
[35] |
Meiklejohn S, Pomarole M, Jordan G, et al. A fistful of Bitcoins: Characterizing payments among men with no names [J]. Communications of the ACM, 2016, 59(4): 86‒93.
|
[36] |
Huang B T, Liu Z G, Chen J H, et al. Behavior pattern clustering in blockchain networks [J]. Multimedia Tools and Applications, 2017, 76(19): 20099‒20110.
|
[37] |
Ermilov D, Panov M, Yanovich Y. Automatic Bitcoin address clustering [R]. Cancun: The 16th IEEE International Conference on Machine Learning and Applications, 2017.
|
[38] |
Sabry F, Labda W, Erbad A, et al. Anonymity and privacy in Bitcoin escrow trades [R]. London: The 18th ACM Workshop on Privacy in the Electronic Society, 2019.
|
[39] |
Zhang Y H, Wang J, Luo J. Heuristic-based address clustering in Bitcoin [J]. IEEE Access, 2020, 8: 210582‒210591.
|
[40] |
Zheng B K, Zhu L H, Shen M, et al. Identifying the vulnerabilities of Bitcoin anonymous mechanism based on address clustering [J]. Science China Information Sciences, 2020, 63(3): 132101.
|
[41] |
He X, He K T, Lin S W, et al. Bitcoin address clustering method based on multiple heuristic conditions [J]. IET Blockchain, 2022, 2(2): 44‒56.
|
[42] |
Liu F, Li Z H, Jia K, et al. Bitcoin address clustering based on change address improvement [J]. IEEE Transactions on Computational Social Systems, 2024, 11(6): 8094‒8105.
|
[43] |
Nick J D. Data-driven de-anonymization in Bitcoin [EB/OL]. (2015-08-09)[2025-02-15]. https://nickler.ninja/papers/thesis.pdf.
|
[44] |
Zhang J S, Gao J B, Li Y, et al. Xscope: Hunting for cross-chain bridge attacks [R]. Rochester: The 37th IEEE/ACM International Conference on Automated Software Engineering, 2023.
|
[45] |
Fanusie Y, Robinson T. Bitcoin laundering: An analysis of illicit flows into digital currency services [EB/OL]. (2018-01-23)[2025-02-15]. https://cdn2.hubspot.net/hubfs/3883533/downloads/Bitcoin%20Laundering.pdf.
|
[46] |
Chainalysis. Transfer impact assessment white paper [EB/OL]. (2023-03-27)[2025-02-15]. https://www.chainalysis.com/wp-content/uploads/2023/03/transfer-impact-assessment-white-paper-march-27-2023.pdf.
|
[47] |
Jevans D, Hardjono T, Vink J, et al. Travel rule information sharing architecture for virtual asset service providers [EB/OL]. [2025-02-15]. https://trisa.io/travel-rule-information-sharing-architecture-for-virtual-asset-service-providers-trisa/.
|
[48] |
Ketenci U G, Kurt T, Onal S, et al. A time-frequency based suspicious activity detection for anti-money laundering [J]. IEEE Access, 2021, 9: 59957‒59967.
|
[49] |
United Nations Office on Drugs and Crime. Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes [EB/OL]. (2011-08-31)[2025-02-15]. https://www.unodc.org/documents/data-and-analysis/Studies/Illicit-financial-flows_31Aug11.pdf.
|
[50] |
Canhoto A I. Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective [J]. Journal of Business Research, 2021, 131: 441‒452.
|
[51] |
Savage D, Wang Q M, Chou P, et al. Detection of money laundering groups using supervised learning in networks [EB/OL]. (2016-08-02)[2025-02-15]. https://arxiv.org/abs/1608.00708v1.
|
[52] |
Wang Y, Wang H, Gao C S J, et al. Intelligent money laundering monitoring and detecting system [R]. London: European, Mediterranean and Middle Eastern Conference on Information Systems, 2008.
|
[53] |
Lorenz J, Silva M I, Aparício D, et al. Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity [R]. New York: The First ACM International Conference on AI in Finance, 2021.
|
[54] |
Turner A B, McCombie S, Uhlmann A J. Analysis techniques for illicit Bitcoin transactions [J]. Frontiers in Computer Science, 2020, 2: 600596.
|
[55] |
Cortes C, Vapnik V. Support-vector networks [J]. Machine Learning, 1995, 20(3): 273‒297.
|
[56] |
Wu P C, Dietterich T G, Wu P C, et al. Improving SVM accuracy by training on auxiliary data sources [R]. Banff: The Twenty-First International Conference on Machine Learning, 2004.
|
[57] |
Gabrilovich E, Markovitch S. Text categorization with many redundant features: Using aggressive feature selection to make SVMs competitive with C4.5 [R]. Banff: The Twenty-first International Conference on Machine Learning, 2004.
|
[58] |
Segata N, Blanzieri E. Operators for transforming kernels into quasi-local kernels that improve SVM accuracy [J]. Journal of Intelligent Information Systems, 2011, 37(2): 155‒186.
|
[59] |
Chen Z Y, Selere O O, Seng N L C. Equipment failure analysis for oil and gas industry with an ensemble predictive model [R]. Singapore: Proceedings of the 9th International Conference on Computational Science and Technology, 2023.
|
[60] |
Liu K Y, Yu T T. An improved support-vector network model for anti-money laundering [R]. Wuhan: 2011 Fifth International Conference on Management of e-Commerce and e-Government, 2011.
|
[61] |
Tang J, Yin J. Developing an intelligent data discriminating system of anti-money laundering based on SVM [R]. Guangzhou: 2005 International Conference on Machine Learning and Cybernetics, 2005.
|
[62] |
Cox D R. The regression analysis of binary sequences [J]. Journal of the Royal Statistical Society Series B: Statistical Methodology, 1958, 20(2): 215‒232.
|
[63] |
Sperandei S. Understanding logistic regression analysis [J]. Biochemia Medica, 2014, 24(1): 12‒18.
|
[64] |
Alarab I, Prakoonwit S, Nacer M I, et al. Comparative analysis using supervised learning methods for anti-money laundering in Bitcoin [R]. Beijing: The 2020 5th International Conference on Machine Learning Technologies, 2020.
|
[65] |
Edwards W, Von Winterfeldt D. Decision analysis and behavioral research [M]. Cambridge: Cambridge University Press, 1986.
|
[66] |
Quinlan J R. Induction of decision trees [J]. Machine Learning, 1986, 1(1): 81‒106.
|
[67] |
Salzberg S L. C4.5: Programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993 [J]. Machine Learning, 1994, 16(3): 235‒240.
|
[68] |
Zhang Y, Trubey P. Machine learning and sampling scheme: An empirical study of money laundering detection [J]. Computational Economics, 2019, 54(3): 1043‒1063.
|
[69] |
Vassallo D, Vella V, Ellul J. Application of gradient boosting algorithms for anti-money laundering in cryptocurrencies [J]. SN Computer Science, 2021, 2(3): 143.
|
[70] |
Chen W L, Guo X F, Chen Z G, et al. Phishing scam detection on ethereum: Towards financial security for blockchain ecosystem [R]. Yokohama: The Twenty-ninth International Joint Conference on Artificial Intelligence, 2020.
|
[71] |
Heath D, Kasif S, Salzberg S. k-DT: A multi-tree learning method [R] Harpers Ferry: The International Workshop on Multistrategy Learning, 1993.
|
[72] |
Ho T K. Random decision forests [R]. Montreal: The 3rd International Conference on Document Analysis and Recognition, 1995.
|
[73] |
Breiman L. Random forests [J]. Machine learning, 2001, 45: 5‒32.
|
[74] |
Kotz S, Johnson N L. Breakthroughs in statistics: Methodology and distribution [M]. New York: Springer New York, 1992.
|
[75] |
Madeh P S, El-Diraby T E. Using machine learning to examine impact of type of performance indicator on flexible pavement deterioration modeling [J]. Journal of Infrastructure Systems, 2021, 27(2): 04021005.
|
[76] |
Hastie T, Tibshirani R, Friedman J. The elements of statistical learning: Data mining, inference, and prediction [M]. New York: Springer New York, 2009.
|
[77] |
Baek H, Oh J, Kim C Y, et al. A model for detecting cryptocurrency transactions with discernible purpose [R]. Zagreb: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), 2019.
|
[78] |
Steinhaus H. Sur la division des corps matériels en parties [J]. Bulletin of the Polish Academy of Sciences Technical Sciences, 1956, 1: 801.
|
[79] |
Shaikh A K, Al-Shamli M, Nazir A. Designing a relational model to identify relationships between suspicious customers in anti-money laundering (AML) using social network analysis (SNA) [J]. Journal of Big Data, 2021, 8(1): 20.
|
[80] |
Zhou Y D, Wang X M, Zhang J J, et al. Analyzing and detecting money-laundering accounts in online social networks [J]. IEEE Network, 2018, 32(3): 115‒121.
|
[81] |
Pettersson R E, Angelis J. Combating money laundering with machine learning-applicability of supervised-learning algorithms at cryptocurrency exchanges [J]. Journal of Money Laundering Control, 2022, 25(4): 766‒778.
|
[82] |
Schmidhuber J, Schmidhuber J. Multi-column deep neural networks for image classification [R]. Providence: The 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2012.
|
[83] |
Defferrard M, Bresson X, Vandergheynst P, et al. Convolutional neural networks on graphs with fast localized spectral filtering [R]. Barcelona: The 30th International Conference on Neural Information Processing Systems, 2016.
|
[84] |
Kolesnikova K, Mezentseva O, Mukatayev T. Analysis of Bitcoin transactions to detect illegal transactions using convolutional neural networks [R]. Nur-Sultan: 2021 IEEE International Conference on Smart Information Systems and Technologies (SIST), 2021.
|
[85] |
Kipf T N, Welling M. Semi-supervised classification with graph convolutional networks [EB/OL]. (2016-09-09)[2025-02-15]. https://arxiv.org/abs/1609.02907.
|
[86] |
Hochreiter S, Schmidhuber J. Long short-term memory [J]. Neural Computation, 1997, 9(8): 1735‒1780.
|
[87] |
Jensen R I T, Iosifidis A. Qualifying and raising anti-money laundering alarms with deep learning [J]. Expert Systems with Applications, 2023, 214: 119037.
|
[88] |
Elmougy Y, Liu L, Elmougy Y, et al. Demystifying fraudulent transactions and illicit nodes in the Bitcoin network for financial forensics [R]. Long Beach: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023.
|
[89] |
Wu L F, Cui P, Pei J, et al. Graph neural networks: Foundation, frontiers and applications [R]. Washington DC: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2022.
|
[90] |
Scarselli F, Gori M, Tsoi A C, et al. The graph neural network model [J]. IEEE Transactions on Neural Networks, 2009, 20(1): 61‒80.
|
[91] |
Velickovic P, Cucurull G, Casanova A, et al. Graph attention networks [EB/OL]. (2017-10-30)[2025-02-15]. https://arxiv.org/abs/1710.10903.
|
[92] |
Humranan P, Supratid S. A study on GCN using focal loss on class-imbalanced Bitcoin transaction for anti-money laundering detection [R]. Krabi: 2023 International Electrical Engineering Congress (iEECON), 2023.
|
[93] |
Pocher N, Zichichi M, Merizzi F, et al. Detecting anomalous cryptocurrency transactions: An AML/CFT application of machine learning-based forensics [J]. Electronic Markets, 2023, 33(1): 37.
|
[94] |
Nicholls J, Kuppa A, Le-Khac N A, et al. FraudLens: Graph structural learning for Bitcoin illicit activity identification [R]. Austin: The 39th Annual Computer Security Applications Conference, 2023.
|
[95] |
Tan R N, Tan Q F, Zhang P, et al. Graph neural network for ethereum fraud detection [R]. Auckland: 2021 IEEE International Conference on Big Knowledge (ICBK), 2021.
|
[96] |
Vaswani A, Shazeer N, Parmar N, et al. Attention is all you need [R]. Long Beach: The 31st International Conference on Neural Information Processing Systems, 2017.
|
[97] |
Altman E, Blanuša J, von Niederhäusern L, et al. Realistic synthetic financial transactions for anti-money laundering models [R]. New Orleans: The 37th International Conference on Neural Information Processing Systems, 2023.
|
[98] |
Jensen R I T, Ferwerda J, Jørgensen K S, et al. A synthetic data set to benchmark anti-money laundering methods [J]. Scientific Data, 2023, 10(1): 661.
|
[99] |
Weber M, Chen J, Suzumura T, et al. Scalable graph learning for anti-money laundering: A first look [EB/OL]. (2018-11-30)[2025-02-15]. https://arxiv.org/abs/1812.00076.
|
[100] |
Wu J J, Lin D, Fu Q S, et al. Toward understanding asset flows in crypto money laundering through the lenses of ethereum heists [J]. IEEE Transactions on Information Forensics and Security, 2024, 19: 1994‒2009.
|
[101] |
Childs A. How cryptomarket communities navigate marketplace structures, risk perceptions and ideologies amid evolving cryptocurrency practices [J]. Criminology & Criminal Justice, 2023: 17488958231213012.
|
[102] |
Wu J J, Liu J L, Chen W L, et al. Detecting mixing services via mining Bitcoin transaction network with hybrid motifs [J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022, 52(4): 2237‒2249.
|
/
〈 |
|
〉 |