Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum

被引:130
作者
Chen, Weili [1 ,2 ]
Zheng, Zibin [1 ,2 ]
Ngai, Edith [3 ]
Zheng, Peilin [1 ,2 ]
Zhou, Yuren [1 ,2 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Natl Engn Res Ctr Digital Life, Guangzhou 510006, Guangdong, Peoples R China
[3] Uppsala Univ, Dept Informat Technol, S-75105 Uppsala, Sweden
基金
中国国家自然科学基金;
关键词
Blockchain; smart contract; Ponzi Schemes; ethereum; data mining; CONTRACTS; INTERNET; SUPPORT;
D O I
10.1109/ACCESS.2019.2905769
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain technology becomes increasingly popular. It also attracts scams, for example, a Ponzi scheme, a classic fraud, has been found making a notable amount of money on Blockchain, which has a very negative impact. To help to deal with this issue and to provide reusable research data sets for future research, this paper collects real-world samples and proposes an approach to detect Ponzi schemes implemented as smart contracts (i.e., smart Ponzi schemes) on the blockchain. First, 200 smart Ponzi schemes are obtained by manually checking more than 3,000 open source smart contracts on the Ethereum platform. Then, two kinds of features are extracted from the transaction history and operation codes of the smart contracts. Finally, a classification model is presented to detect smart Ponzi schemes. The extensive experiments show that the proposed model performs better than many traditional classification models and can achieve high accuracy for practical use. By using the proposed approach, we estimate that there are more than 500 smart Ponzi schemes running on Ethereum. Based on these results, we propose to build a uniform platform to evaluate and monitor every created smart contract for early warning of scams.
引用
收藏
页码:37575 / 37586
页数:12
相关论文
共 56 条
[1]   Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams [J].
Aitzhan, Nurzhan Zhumabekuly ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :840-852
[2]  
Androulaki E., 2013, LNCS, V7859, P34, DOI [DOI 10.1007/978-3-642-39884-1, 10.1007/978-3-642-39884-14, DOI 10.1007/978-3-642-39884-14]
[3]  
[Anonymous], RIPPLE PROTOCOL CONS
[4]  
[Anonymous], Ppcoin: Peer-to-peer crypto-currency with proof-of-stake
[5]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[6]  
Bartoletti M., 2017, DISSECTING PONZI SCH
[7]   Data mining for detecting Bitcoin Ponzi schemes [J].
Bartoletti, Massimo ;
Pes, Barbara ;
Serusi, Sergio .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :75-84
[8]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[9]   Pasting small votes for classification in large databases and on-line [J].
Breiman, L .
MACHINE LEARNING, 1999, 36 (1-2) :85-103
[10]  
Bühlmann P, 2002, ANN STAT, V30, P927