Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding

被引:148
作者
Wu, Jiajing [1 ]
Yuan, Qi [1 ]
Lin, Dan [1 ]
You, Wei [1 ]
Chen, Weili [1 ]
Chen, Chuan [1 ]
Zheng, Zibin [1 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2022年 / 52卷 / 02期
基金
中国国家自然科学基金;
关键词
Phishing; Feature extraction; Electronic mail; Cryptocurrency; Support vector machines; Blockchain; Ethereum; network embedding; phishing detection;
D O I
10.1109/TSMC.2020.3016821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, blockchain technology has become a topic in the spotlight but also a hotbed of various cybercrimes. Among them, phishing scams on blockchain have been found to make a notable amount of money, thus emerging as a serious threat to the trading security of the blockchain ecosystem. In order to create a favorable environment for investment, an effective method for detecting phishing scams is urgently needed in the blockchain ecosystem. To this end, this article proposes an approach to detect phishing scams on Ethereum by mining its transaction records. Specifically, we first crawl the labeled phishing addresses from two authorized websites and reconstruct the transaction network according to the collected transaction records. Then, by taking the transaction amount and timestamp into consideration, we propose a novel network embedding algorithm called trans2vec to extract the features of the addresses for subsequent phishing identification. Finally, we adopt the one-class support vector machine (SVM) to classify the nodes into normal and phishing ones. Experimental results demonstrate that the phishing detection method works effectively on Ethereum, and indicate the efficacy of trans2vec over existing state-of-the-art algorithms on feature extraction for transaction networks. This work is the first investigation on phishing detection on Ethereum via network embedding and provides insights into how features of large-scale transaction networks can be embedded.
引用
收藏
页码:1156 / 1166
页数:11
相关论文
共 38 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[3]   The Anti-Social System Properties: Bitcoin Network Data Analysis [J].
Alqassem, Israa ;
Rahwan, Iyad ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01) :21-31
[4]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[5]  
Bartoletti M., 2017, DISSECTING PONZI SCH
[6]  
Belkin M, 2002, ADV NEUR IN, V14, P585
[7]  
Cao SS, 2016, AAAI CONF ARTIF INTE, P1145
[8]  
Chen T., 2016, P 25 INT JOINT C ART, P1396
[9]   Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology [J].
Chen, Weili ;
Zheng, Zibin ;
Cui, Jiahui ;
Ngai, Edith ;
Zheng, Peilin ;
Zhou, Yuren .
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, :1409-1418
[10]   A Survey on Security and Privacy Issues of Bitcoin [J].
Conti, Mauro ;
Kumar, E. Sandeep ;
Lal, Chhagan ;
Ruj, Sushmita .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3416-3452