Do Not Rug on Me: Leveraging Machine Learning Techniques for Automated Scam Detection

被引:22
|
作者
Mazorra, Bruno [1 ]
Adan, Victor [2 ]
Daza, Vanesa [1 ]
机构
[1] Pompeu Fabra Univ, Dept Informat & Commun Technol, Tanger Bldg, Barcelona 08018, Spain
[2] Univ Barcelona, Fac Econ & Business, Barcelona 08034, Spain
关键词
ethereum; DeFi; DEX; scam detection;
D O I
10.3390/math10060949
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Uniswap, as with other DEXs, has gained much attention this year because it is a non-custodial and publicly verifiable exchange that allows users to trade digital assets without trusted third parties. However, its simplicity and lack of regulation also make it easy to execute initial coin offering scams by listing non-valuable tokens. This method of performing scams is known as rug pull, a phenomenon that already exists in traditional finance but has become more relevant in DeFi. Various projects have contributed to detecting rug pulls in EVM compatible chains. However, the first longitudinal and academic step to detecting and characterizing scam tokens on Uniswap was made. The authors collected all the transactions related to the Uniswap V2 exchange and proposed a machine learning algorithm to label tokens as scams. However, the algorithm is only valuable for detecting scams accurately after they have been executed. This paper increases their dataset by 20K tokens and proposes a new methodology to label tokens as scams. After manually analyzing the data, we devised a theoretical classification of different malicious maneuvers in the Uniswap protocol. We propose various machine-learning-based algorithms with new, relevant features related to the token propagation and smart contract heuristics to detect potential rug pulls before they occur. In general, the models proposed achieved similar results. The best model obtained accuracy of 0.9936, recall of 0.9540, and precision of 0.9838 in distinguishing non-malicious tokens from scams prior to the malicious maneuver.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Automated video surveillance and machine learning: Leveraging existing infrastructure for cardiac arrest detection and emergency response activation
    Douma, Matthew J.
    RESUSCITATION, 2018, 126 : E3 - E3
  • [22] Leveraging machine learning techniques to analyze nutritional content in processed foods
    Muthukumar, K.A.
    Gupta, Soumya
    Saikia, Doli
    Discover Food, 2024, 4 (01):
  • [23] Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques
    Verma, Mayank
    Kumarguru, Ponnurangam
    Deb, Shuva Brata
    Gupta, Anuradha
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 154 - 159
  • [24] Leveraging Machine Learning Techniques to Investigate the Pathogenesis of Incident Bacterial Vaginosis
    Elnaggar, J.
    Jacobs, C.
    Ardizzone, C.
    Aaron, K.
    Eastlund, I
    Graves, K.
    Luo, M.
    Tamhane, A.
    Long, D.
    Laniewski, P.
    Herbst-Kralovetz, M.
    Quayle, A.
    Cerca, N.
    Muzny, C.
    Taylor, C.
    AMERICAN JOURNAL OF OBSTETRICS AND GYNECOLOGY, 2024, 231 (06)
  • [25] Enhancing Network Security: Leveraging Machine Learning for Intrusion Detection
    Rao, M. Veera V. Rama
    Rapaka, Anuj
    Prasad, M.
    Rao, P. B. V. Raja
    Satyanarayanamurty, P.
    Pokkuluri, Kiran Sree
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 1555 - 1562
  • [26] Leveraging machine learning for proactive detection and mitigation of Android RAT
    Ghosh, Subhasish
    Ponduru, Jithin
    Thatikonda, Mukesh
    Mandal, Amit Kr
    Innovations in Systems and Software Engineering, 2024,
  • [27] Leveraging Machine Learning for Early Detection of Soybean Crop Pests
    Kim, Bong-Hyun
    Alamri, Atif M.
    Alqahtani, Salman A.
    LEGUME RESEARCH, 2024, 47 (06) : 1023 - 1031
  • [28] Leveraging machine learning for enhanced cybersecurity: an intrusion detection system
    Sahib, Wurood Mahdi
    Alhuseen, Zainab Ali Abd
    Saeedi, Iman Dakhil Idan
    Abdulkadhem, Abdulkadhem A.
    Ahmed, Ali
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2024,
  • [29] Leveraging machine learning for proactive detection and mitigation of Android RAT
    Ghosh, Subhasish
    Ponduru, Jithin
    Thatikonda, Mukesh
    Mandal, Amit Kr
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024,
  • [30] Network Intrusion Detection Leveraging Machine Learning and Feature Selection
    Ali, Arshid
    Shaukat, Shahtaj
    Tayyab, Muhammad
    Khan, Muazzam A.
    Khan, Jan Sher
    Arshad
    Ahmad, Jawad
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON SMART COMMUNITIES: IMPROVING QUALITY OF LIFE USING ICT, IOT AND AI (IEEEHONET 2020), 2020, : 49 - 53