Detecting malicious accounts in permissionless blockchains using temporal graph properties

被引:22
作者
Agarwal, Rachit [1 ]
Barve, Shikhar [1 ]
Shukla, Sandeep Kumar [1 ]
机构
[1] IIT Kanpur, Comp Sci Dept, Kanpur 208016, Uttar Pradesh, India
关键词
Blockchain; Machine Learning; Temporal graphs; Behavior analysis; Ethereum; Suspect identification;
D O I
10.1007/s41109-020-00338-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset-the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.
引用
收藏
页数:30
相关论文
共 36 条
[1]   Fraud detection system: A survey [J].
Abdallah, Aisha ;
Maarof, Mohd Aizaini ;
Zainal, Anazida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :90-113
[2]   powerlaw: A Python']Python Package for Analysis of Heavy-Tailed Distributions [J].
Alstott, Jeff ;
Bullmore, Edward T. ;
Plenz, Dietmar .
PLOS ONE, 2014, 9 (01)
[3]  
[Anonymous], 2020, ALLINVAIN THEFT
[4]  
[Anonymous], 2016, ARXIV161007717
[5]   Fitness preferential attachment as a driving mechanism in bitcoin transaction network [J].
Aspembitova, Ayana ;
Feng, Ling ;
Melnikov, Valentin ;
Chew, Lock Yue .
PLOS ONE, 2019, 14 (08)
[6]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[7]   Data mining for detecting Bitcoin Ponzi schemes [J].
Bartoletti, Massimo ;
Pes, Barbara ;
Serusi, Sergio .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :75-84
[8]  
Bitfly Gmbh, 2020, ETH THE ETH BLOCKCH ETH THE ETH BLOCKCH
[9]  
Bryk A., 2018, BLOCKCHAIN ATTACK VE
[10]  
Buterin V, 2020, T SPAM ATTACK NEXT S T SPAM ATTACK NEXT S