OceanEx Releases New AI Framework SHORELINE to Mitigate Losses of Exchanges Hacks

We are proud to announce that Professor Jiayu Zhou, Co-founder and CTO of OceanEx has released a paper detailing SHORELINE, a deep-learning framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks. Its major use case details a process that would mitigate risk from cyber criminals and hackers on cryptocurrency exchanges.

Professor Jiayu Zhou, along with Xitong Zhang of Michigan State University and He Zhu of OceanEx Labs have documented his study on the possible efficacy of SHORELINE in terms of cryptocurrency trading platforms in his 2020 paper, “Shoreline: Data-Driven Threshold Estimation of Online Reserves of Cryptocurrency Trading Platforms”. The paper has been officially recognized and published by the Association for the Advancement of Artificial Intelligence (AAAI).

An in depth look at the issues plaguing exchanges

Currently, cryptocurrency exchanges face large issues with asset safety. Over 4 billion USD have been compromised since 2019 due to hackers penetrating crypto currency exchanges and carefully maintained trading systems. Crypto exchanges manage accounts to accept deposits from and issue withdrawals to its customers. Crypto exchanges also build and maintain order books for the customers to trade at specific prices. However, what differentiates this from traditional financial systems, where fiat transactions are being settled between real persons, is that each blockchain transaction is between two addresses and is considered finalized once the sender signs the transaction by the corresponding private key. Such anonymity has brought significant security risks to crypto exchanges. If a hacker manages to control a compromised server of the crypto exchange and steals the private key, the hacker can immediately withdraw all the assets in the exchange by signing a transaction to one of his/her addresses using the stolen private key. The private key that is stored in the exchange server and programmatically signs transactions when a customer requests a withdrawal. This is referred to as a hot wallet, and has been the most critically vulnerable part of crypto exchanges to date.

Cryptocurrency exchanges maintain a certain amount of assets in these hot wallets for several reasons, such as operational cost reduction and minimizing the exposure of cold storage private keys. Hot wallets are crucial for high-frequency trading for their operational efficiency. Due to the vulnerability of potential hacks, only a portion of total assets are stored on hot wallets while the rest of the assets are stored into “cold wallets”, digital wallets which do not sign private keys online. Therefore, being able to accurately control the available assets in the hot wallets becomes the key to minimize and balance theft risk and efficiency of running an exchange. The ideal situation is that risk stays under control, even when the private keys of the hot wallet are leaked. However, determining such an optimal threshold remains a challenging task because of the complicated dynamics inside exchanges. The solution to the issue is SHORELINE, a deep learning-based threshold estimation framework that estimates the optimal threshold of hot wallets from historical wallet activities and dynamic trading networks.

Overview of the SHORELINE framework

For the first time, we provide a data-driven framework called SHORELINE to estimate the optimal threshold for a specific exchange, leveraging its historical data using machine learning techniques. There are two major components included as shown in Figure 1 on network embedding and optimal threshold estimation, as shown below each cryptocurrency is embedded into a low-dimensional vector space temporally, based on the sampled sequences from temporal random walks on dynamic trading networks. To estimate the threshold, we combine multiple data modalities from exchanges, such as the historical trading observations, withdraw and deposit history and currency embedding features.

SHORELINE at work: a case study on OceanEx

SHORELINE provides a deep-learning data-driven framework which provides an optimal threshold estimate for exchanges to determine how funds should be allocated in hot wallets to balance theft risk and operational efficiency. The framework does this by leveraging historical data using machine learning techniques such as Dynamic Networks Embedding and Optimal Threshold Estimation, as demonstrated above. The historical data includes data modalities such as historical trading observations, withdraw and deposit history and currency embedding features. With SHORELINE, cryptocurrency exchanges can run optimal efficient operations while still mitigating risk from hackers and reducing the exposure of funds for cybercrimes.

We mainly uses three wallets — cold wallet, hot wallet and warm wallet which is used to accept user deposits. Cold wallet withdrawal requires multiple people in the risk control team to operate at the same time, so it is very safe but inefficient, generally only suitable for N + 1 operations. The hot wallet withdrawal is completely automated by the exchange system, so while the risk is higher than the cold wallet, it is very efficient and suitable for a large number of users to withdraw their needs. When a deposit enters into the user’s warm wallet, the system will immediately transfer the deposit to a hot wallet or a cold wallet according to a certain strategy.

With the use of AI technology a risk control mathematical model that is more suitable for exchanges can be established. In our case, OceanEx is an organic operation where market activity, the linkage with multiple tokens, macro user activities, and more fine-grained user behavior habits, work together. After evaluation, our research team found that this model compared with the previous simple model, greatly increased the operating efficiency of the system and minimized the risk of theft.

The future for exchanges

Security is not static, but a very dynamic concept. As early as the 19th century, cryptography was theoretically based on encryption and decryption methods, such as Charles Babbage’s multi-character encryption analysis. After World War I and World War II, the encryption algorithm has been continuously innovated by mathematicians and researchers, and has been continuously cracked by researchers. Nowadays, encryption algorithms have been widely used in various places in the computer and communication fields, including not only cryptocurrency, from encryption protocols at the bottom link layer of the network, to SSL certificates at the secure socket layer, and hash algorithms to store user passwords. Every day, there is new research to enhance these algorithms being tracked by researchers worldwide, trying to crack these algorithms. Therefore, today’s secure encryption algorithm will be less secure tomorrow. Likewise, it is routine work for the OceanEx technical team to discover new threats and use cutting-edge technology to minimize the risks that unknown threats may bring in this dynamic security field.

OceanEx Team


Please stay tuned and follow us on our official channels:

Twitter — https://twitter.com/OceanexOfficial

Telegram — https://t.me/OceanEx_Official

Telegram Germany — https://t.me/OceanEx_German_Official

Telegram Dutch — https://t.me/oceanexNL_dutch_official

Telegram Vietnam — https://t.me/OceanEx_Vietnam_Official

Telegram Mandarin — https://t.me/OceanEx_Mandarin_Official

Telegram Indian- https://t.me/OceanEx_Indian_Official

Medium — https://medium.com/@OceanEx

Facebook — https://www.facebook.com/OceanExPROOfficial

Reddit — https://www.reddit.com/r/OceanExOfficial/




The AI-powered Next Generation Intelligent Digital Asset Exchange Ecosystem

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Infinity Chain AMA Recap with Kieron Cartledge

📚Coinstore Classroom: Crypto Trading 101 — Part 6🤓

How to choose the right altcoin for your crypto-folio?

How and Where to Buy Colibri Protocol (CLBR) — An Easy Step by Step Guide | Crypto Buying Tips


Earn Passive Income With Ethereum 2.0 Staking, Risks vs. Rewards

+35.03% growth: How to Buy YeaFinance (YEA) — A Step by Step Guide | Crypto Buying Tips


Why Do Cryptocurrencies Exist?

WARNING: A Dangerous Playground

Bitcoin mining rig

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
OceanEx Official

OceanEx Official

The AI-powered Next Generation Intelligent Digital Asset Exchange Ecosystem

More from Medium

Talking Web3 With NEU Dev & Solon Finance

Crypto 101 with Vin: Smart Contracts

Experiment completed — Ruby Mine is dead

In a Nutshell: Decentralized Finance