Analyzing BitCoin Network Transactions with Neo4j

DZone 's Guide to

Analyzing BitCoin Network Transactions with Neo4j

· Big Data Zone ·
Free Resource

Besides helping our customers to be successful trying and using Neo4j, DC-based David Fauth is always on the lookout for interesting new datasets to analyze.

Being a (big) data scientist and data analyst by heart, he excels in deriving new insights from existing data and explaining the intricate connections that reveal it.

In previous installments he analyzed the FEC Campaign Data with Neo4j and showed how to import DocGraph Datasets.

This time he went really big, for the …​

Bitcoin Network.jpg

BitCoin Network

In the three-part series you’ll learn how to model that data as a graph, prepare and import the raw data and analyze it using Neo4j’s Cypher query language to gain new insights.

Let’s look at the posts in detail:

In the first article he showed how we could use Linked Data Analysis to look at Bitcoin transactions.

Screen Shot 2015 01 26 at 6.44.31 AM 1024x573.png

The data contained in the Bitcoin (BTC) network is difficult to analyze manually, but can yield a high volume of relevant information.

In Part 2, he looked at how you can harvest Bitcoin data, prepare it for loading into Neo4j and then finally, load the data. For the fastest import of the raw CSV files, he used the new scalable import tool that comes with Neo4j 2.2.

Using Neo4j’s powerful graph data model, he modeled the BTC data as a graph encapsulating the relationships in the data – for example the relationships between bitcoins, transactions, blocks, and wallets.

In Part 3 by utilizing Neo4j’s Cypher language, Dave showed how we can query the data looking for patterns of activity, easily visualize the data and provide the data out to be analyzed with machine learning algorithms.

Screen Shot 2015 02 10 at 11.59.38 AM 1024x569.png

All code and data can be downloaded from his GitHub Account.

If you are interested in integrating Neo4j with other Big Data solutions, like Hadoop, Spark or Splunk don’t hesitate to request contact with Dave.

Follow Dave’s explanation step by step in the video below:


Published at DZone with permission of Michael Hunger , DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}