Abstract
Since Bitcoin was first conceived in 2008, blockchain technology has attracted a large amount of researchers’ attention. At the same time, it has also facilitated a variety of cybercrimes. For example, Ethereum frauds, due to the potential for huge profits, occur frequently and pose a serious threat to the financial security of the Ethereum network. To create healthy financial environments, methods for automatically detecting and identifying Ethereum frauds are urgently needed in Ethereum system governance. To this end, this paper proposes a new framework to detect fraudulent transactions in Ethereum by mining Ethereum transaction records. Specifically, we obtain Ethereum addresses with fraud/legitimate labels through Web crawlers and then construct a transaction network according to the public transaction ledger. Then, a transaction behavior-based network embedding algorithm is proposed to extract node features for subsequent fraudulent transaction identification. Finally, we adopt the Graph Convolutional Neural Network model (GCN) to classify addresses into legal and fraudulent addresses. The experimental results show that the fraudulent transaction detection system can achieve an accuracy of 96% on fraud/legitimate record classification, which proves the effectiveness of the framework in the detection of Ethereum fraudulent transactions.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 21260
Yaga D, Mell P, Roby N, Scarfone K (2019) Blockchain technology overview. arXiv preprint arXiv:1906.11078
Beck R, Czepluch JS, Lollike N, Malone S (2016) Blockchain–the gateway to trust-free cryptographic transactions. In: Twenty-Fourth European conference on information systems (ECIS), İstanbul, Turkey. Springer Publishing Company, pp 1–14
Singh S, Singh N (2016) Blockchain: future of financial and cyber security. In: 2016 2nd international conference on contemporary computing and informatics (IC3I). IEEE, pp 463–467
Liu C, Xiao Y, Javangula V, Hu Q, Wang S, Cheng X (2018) Normachain: a blockchain-based normalized autonomous transaction settlement system for IoT-based e-commerce. IEEE Internet Things J 6(3):4680–4693
Liang W, Zhang D, Lei X, Tang M, Li K-C, Zomaya AY (2020) Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans Emerg Top Comput 9(3):1410–1420
Pham HL, Tran TH, Nakashima Y (2019) Practical anti-counterfeit medicine management system based on blockchain technology. In: 2019 4th technology innovation management and engineering science international conference (TIMES-iCON), IEEE, pp 1–5
Bayatmakou BS (2018) Money laundering and black markets. In: Human-computer interaction and cybersecurity handbook. CRC Press, pp 157–174
Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Trans Syst Man Cyber Syst 52(2):1156–1166
Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tutor 20(4):3416–3452
Unknown: Scammers “exploit Chaos” to Steal \$1 Million on Ethereum Merge. (2022, Nov 4). https://0xzx.com/2022110402042812029.html
Castellanos JAF, Coll-Mayor D, Notholt JA (2017) Cryptocurrency as guarantees of origin: simulating a green certificate market with the ethereum blockchain. In: 2017 IEEE international conference on smart energy grid engineering (SEGE). IEEE, pp 367–372
Khonji M, Iraqi Y, Jones A (2013) Phishing detection: a literature survey. IEEE Commun Surv Tutor 15(4):2091–2121
Ganesan R et al. (2014) Data security in cloud architecture based on diffie hellman and elliptical curve cryptography. Cryptology ePrint Archive
Chao X, Kou G, Peng Y, Alsaadi FE (2019) Behavior monitoring methods for trade-based money laundering integrating macro and micro prudential regulation: a case from china. Technol Econ Dev Econ 25(6):1081–1096
Spagnuolo M, Maggi F, Zanero S (2014) Bitiodine: extracting intelligence from the bitcoin network. In: International conference on financial cryptography and data security. Springer, pp 457–468.
Fleder M, Kester MS, Pillai S (2015) Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657
Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941
Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust bitcoin fraud detection. In: 2016 Information security for south Africa (ISSA). IEEE, pp 129–134
Tang J, Qu M, Wang M, Zhang M, Yan J, Mei Q (2015) Line: large-scale information network embedding. In: 24th International conference on world wide web, pp 1067–1077
Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864
Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 701–710
Qiu J, Dong Y, Ma H, Li J, Wang K, Tang J (2018) Network embedding as matrix factorization: unifying deepwalk, line, pte, and node2vec. In: Eleventh ACM international conference on web search and data mining, pp 459–467
Kaur A, Sharma P, Verma A (2014) A appraisal paper on breadth-first search, depth-first search and red black tree. Int J Sci Res Publ 4(3):2–4
Wang Y, Dong L, Jiang X, Ma X, Li Y, Zhang H (2021) Kg2vec: a node2vec-based vectorization model for knowledge graph. PLoS ONE 16(3):0248552
Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255–260
Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2009) The graph neural network model. IEEE Trans Neural Netw 20(1):61–80
Defferrard M, Bresson X, Vandergheynst P (2016) Convolutional neural networks on graphs with fast localized spectral filtering. Adv Neural Inform Proc Syst, 29
Veličković P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y (2017) Graph attention networks. arXiv preprint arXiv:1710.10903
Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591
Patel V, Pan L, Rajasegarar S (2020) Graph deep learning based anomaly detection in ethereum blockchain network. In: International conference on network and system security. Springer, pp 132–148
Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
Buterin V et al. (2014) A next-generation smart contract and decentralized application platform. White paper 3(37)
Chen W, Guo X, Chen Z, Zheng Z, Lu Y (2020) Phishing scam detection on ethereum: towards financial security for blockchain ecosystem. In: IJCAI, pp 4506–4512
Bartoletti M, Carta S, Cimoli T, Saia R (2020) Dissecting ponzi schemes on ethereum: identification, analysis, and impact. Futur Gener Comput Syst 102:259–277
Bistarelli S, Mazzante G, Micheletti M, Mostarda L, Sestili D, Tiezzi F (2020) Ethereum smart contracts: analysis and statistics of their source code and opcodes. Internet Things 11:100198
Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2021) Phishing scams detection in ethereum transaction network. ACM Trans Internet Techn 21(1):10–11016. https://doi.org/10.1145/3398071
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830
Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inform Proc Syst 30
Wang MY (2019) Deep graph library: towards efficient and scalable deep learning on graphs. In: ICLR Workshop on representation learning on graphs and manifolds
Acknowledgements
This research is supported by the National Natural Science Foundation of China (61972105), Joint Research Fund of Guangzhou and University (202201020181), and the Guangdong Province Key Research and Development Plan (2019B010137003), and in part by the Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
We confirm that there is no conflict-of-interest in the submission, and the manuscript was approved by all the authors for publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tan, R., Tan, Q., Zhang, Q. et al. Ethereum fraud behavior detection based on graph neural networks. Computing 105, 2143–2170 (2023). https://doi.org/10.1007/s00607-023-01177-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-023-01177-7