Ethereum fraud behavior detection based on graph neural networks

被引:0
作者
Runnan Tan
Qingfeng Tan
Qin Zhang
Peng Zhang
Yushun Xie
Zhao Li
机构
[1] Guangzhou University,Cyberspace Institute of Advanced Technology
[2] Shenzhen University,Big Data Institute, College of Computer Science and Software Engineering
[3] University of Electronic Science and Technology of China,Shenzhen Institute for Advanced Study
[4] Zhejiang University,undefined
来源
Computing | 2023年 / 105卷
关键词
Ethereum; Fraud transaction detection; Graph neural networks; Trading behavior;
D O I
暂无
中图分类号
学科分类号
摘要
Since Bitcoin was first conceived in 2008, blockchain technology has attracted a large amount of researchers’ attention. At the same time, it has also facilitated a variety of cybercrimes. For example, Ethereum frauds, due to the potential for huge profits, occur frequently and pose a serious threat to the financial security of the Ethereum network. To create healthy financial environments, methods for automatically detecting and identifying Ethereum frauds are urgently needed in Ethereum system governance. To this end, this paper proposes a new framework to detect fraudulent transactions in Ethereum by mining Ethereum transaction records. Specifically, we obtain Ethereum addresses with fraud/legitimate labels through Web crawlers and then construct a transaction network according to the public transaction ledger. Then, a transaction behavior-based network embedding algorithm is proposed to extract node features for subsequent fraudulent transaction identification. Finally, we adopt the Graph Convolutional Neural Network model (GCN) to classify addresses into legal and fraudulent addresses. The experimental results show that the fraudulent transaction detection system can achieve an accuracy of 96% on fraud/legitimate record classification, which proves the effectiveness of the framework in the detection of Ethereum fraudulent transactions.
引用
收藏
页码:2143 / 2170
页数:27
相关论文
共 73 条
  • [1] Liu C(2018)Normachain: a blockchain-based normalized autonomous transaction settlement system for IoT-based e-commerce IEEE Internet Things J 6 4680-4693
  • [2] Xiao Y(2020)Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection IEEE Trans Emerg Top Comput 9 1410-1420
  • [3] Javangula V(2020)Who are the phishers? Phishing scam detection on ethereum via network embedding IEEE Trans Syst Man Cyber Syst 52 1156-1166
  • [4] Hu Q(2018)A survey on security and privacy issues of bitcoin IEEE Commun Surv Tutor 20 3416-3452
  • [5] Wang S(2013)Phishing detection: a literature survey IEEE Commun Surv Tutor 15 2091-2121
  • [6] Cheng X(2019)Behavior monitoring methods for trade-based money laundering integrating macro and micro prudential regulation: a case from china Technol Econ Dev Econ 25 1081-1096
  • [7] Liang W(2014)A appraisal paper on breadth-first search, depth-first search and red black tree Int J Sci Res Publ 4 2-4
  • [8] Zhang D(2021)Kg2vec: a node2vec-based vectorization model for knowledge graph PLoS ONE 16 0248552-260
  • [9] Lei X(2015)Machine learning: trends, perspectives, and prospects Science 349 255-80
  • [10] Tang M(2009)The graph neural network model IEEE Trans Neural Netw 20 61-32