Skip to main content

Understanding Ethereum Transactions via Network Approach

  • Chapter
  • First Online:
Graph Data Mining

Part of the book series: Big Data Management ((BIGDM))

Abstract

Ethereum, which is one of the largest public blockchain-based platforms, provides an unprecedented opportunity for data mining. However, the analysis of Ethereum transaction records remains under-explored. In this chapter, we model Ethereum transaction records as a complex network and further study the problem of phishing detection and transaction tracking via node classification and link prediction, respectively, which provides a deeper understanding of Ethereum transactions from a network perspective. Specifically, we introduce time-series snapshot network (TSSN) to model Ethereum transaction records as a spatial-temporal network and present temporal biased walk (TBW) to effectively embed accounts via their transaction records, which integrates temporal and structural information of the proposed network. Furthermore, we provide a detailed and systematic analysis of various graph embedding models and compare our proposed method with these embedding technologies on realistic Ethereum transaction records. Experimental results demonstrate the superiority of our TBW in learning more informative representations, and is essential for Ethereum network analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    [f(u) ⋅ f(v)]i = f i(u) ∗ f i(v).

References

  1. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., Sebastopol (2015)

    Google Scholar 

  2. Holub, A., O’Connor, J.: Coinhoarder: tracking a Ukrainian bitcoin phishing ring DNS style. In: 2018 APWG Symposium on Electronic Crime Research (eCrime), pp. 1–5. IEEE, Piscataway (2018)

    Google Scholar 

  3. Russon, M.A.: Ethereum under siege: scammers make $700000 in 6 days from slack and Reddit phishing attacks (2017)

    Google Scholar 

  4. Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. IEEE Commun. Surv. Tut. 15(4), 2091–2121 (2013)

    Article  Google Scholar 

  5. Rossi, R., Neville, J.: Time-evolving relational classification and ensemble methods. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 1–13. Springer, Berlin (2012)

    Google Scholar 

  6. Lü, L., Zhou, T.: Link prediction in complex networks: a survey. Phys. A Stat. Mech. Appl. 390(6), 1150–1170 (2011)

    Article  Google Scholar 

  7. Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)

    Article  MathSciNet  Google Scholar 

  8. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, pp. 6–24. Springer, Berlin (2013)

    Google Scholar 

  9. Jiang, Z., Liang, J.: Cryptocurrency portfolio management with deep reinforcement learning. In: 2017 Intelligent Systems Conference (IntelliSys), pp. 905–913. IEEE, Piscataway (2017)

    Google Scholar 

  10. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp. 1409–1418 (2018)

    Google Scholar 

  11. Liang, J., Li, L., Zeng, D.: Evolutionary dynamics of cryptocurrency transaction networks: an empirical study. PLoS One 13(8), e0202202 (2018)

    Article  Google Scholar 

  12. Wu, J., Liu, J., Chen, W., Huang, H., Zheng, Z., Zhang, Y.: Detecting mixing services via mining bitcoin transaction network with hybrid motifs. Preprint. arXiv:2001.05233 (2020)

    Google Scholar 

  13. Wu, J., Yuan, Q., Lin, D., You, W., Chen, W., Chen, C., Zheng, Z.: Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Trans. Syst. Man Cyber. Syst. 1–11 (2020)

    Google Scholar 

  14. Yuan, Q., Huang, B., Zhang, J., Wu, J., H. Zhang, Zhang, X.: Detecting phishing scams on ethereum based on transaction records. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE, Piscataway (2020)

    Google Scholar 

  15. Wu, J., Lin, D., Zheng, Z., Yuan, Q.: T-edge: temporal weighted multidigraph embedding for ethereum transaction network analysis. Preprint. arXiv:1905.08038 (2019)

    Google Scholar 

  16. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)

    Google Scholar 

  17. Weili, C., Zibin, Z.: Blockchain data analysis: a review of status, trends and challenges. J. Comput. Res. Develop. 55(9), 1853 (2018)

    Google Scholar 

  18. Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.-Y.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cyber. Syst. 49(11), 2266–2277 (2019)

    Article  Google Scholar 

  19. Chen, T., Zhu, Y., Li, Z., Chen, J., Li, X., Luo, X., Lin, X., Zhange, X.: Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 1484–1492. IEEE, Piscataway (2018)

    Google Scholar 

  20. Lin, D., Wu, J., Yuan, Q., Zheng, Z.: Modeling and understanding ethereum transaction records via a complex network approach. IEEE Trans. Circuits Syst. Express Briefs 67(11), 2737–2741 (2020)

    Article  Google Scholar 

  21. Goyal, P., Ferrara, E.: Graph embedding techniques, applications, and performance: a survey. Knowl. Based Syst. 151, 78–94 (2018)

    Article  Google Scholar 

  22. Cai, H., Zheng, V.W., Chang, K.C.-C.: A comprehensive survey of graph embedding: Problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)

    Article  Google Scholar 

  23. Ahmed, A., Shervashidze, N., Narayanamurthy, S., Josifovski, V., Smola, A.J.: Distributed large-scale natural graph factorization. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 37–48 (2013)

    Google Scholar 

  24. Ou, M., Cui, P., Pei, J., Zhang, Z., Zhu, W.: Asymmetric transitivity preserving graph embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1105–1114 (2016)

    Google Scholar 

  25. Van Loan, C.F.: Generalizing the singular value decomposition. SIAM J. Numer. Anal. 13(1), 76–83 (1976)

    Article  MathSciNet  Google Scholar 

  26. Newman, M.E.J.: A measure of betweenness centrality based on random walks. Soc. Net. 27(1), 39–54 (2005)

    Article  Google Scholar 

  27. Fouss, F., Pirotte, A., Renders, J.-M., Saerens, M.: Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation. IEEE Trans. Knowl. Data Eng. 19(3), 355–369 (2007)

    Article  Google Scholar 

  28. Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. Preprint. arXiv:1301.3781 (2013)

    Google Scholar 

  29. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710 (2014)

    Google Scholar 

  30. Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855–864 (2016)

    Google Scholar 

  31. Wang, D., Cui, P., Zhu, W.: Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225–1234 (2016)

    Google Scholar 

  32. Cao, S., Lu, W., Xu, Q.: Deep neural networks for learning graph representations. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 16, pp. 1145–1152 (2016)

    Google Scholar 

  33. Niepert, M., Ahmed, M., Kutzkov, K.: Learning convolutional neural networks for graphs. In: International Conference on Machine Learning, pp. 2014–2023 (2016)

    Google Scholar 

  34. Kipf, T.N., Welling, M.: Variational graph auto-encoders. Preprint. arXiv:1611.07308 (2016)

    Google Scholar 

  35. Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web, pp. 1067–1077 (2015)

    Google Scholar 

  36. Chen, J., Wu, Y., Xu, X., Zheng, H., Ruan, Z., Xuan, Q.: Pso-ane: adaptive network embedding with particle swarm optimization. IEEE Trans. Comput. Soc. Syst. 6(4), 649–659 (2019)

    Article  Google Scholar 

  37. Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: methods and applications. Preprint. arXiv:1709.05584 (2017)

    Google Scholar 

  38. Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013)

    Google Scholar 

  39. Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT’2010, pp. 177–186. Springer, Berlin (2010)

    Google Scholar 

  40. Conti, M., Kumar, E.S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416–3452 (2018)

    Article  Google Scholar 

  41. Jaccard, P.: Étude comparative de la distribution florale dans une portion des alpes et des jura. Bull. Soc. Vaudoise Sci. Nat. 37, 547–579 (1901)

    Google Scholar 

  42. Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211–230 (2003)

    Article  Google Scholar 

  43. Zhou, T., L. Lü, Zhang, Y.-C.: Predicting missing links via local information. Euro. Phys. J. B 71(4), 623–630 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Xuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Xie, Y. et al. (2021). Understanding Ethereum Transactions via Network Approach. In: Xuan, Q., Ruan, Z., Min, Y. (eds) Graph Data Mining. Big Data Management. Springer, Singapore. https://doi.org/10.1007/978-981-16-2609-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2609-8_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2608-1

  • Online ISBN: 978-981-16-2609-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics