Skip to main content

Ponzi Scheme Detection in Ethereum Transaction Network

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1490))

Included in the following conference series:

Abstract

With the rapid growth of blockchain, an increasing number of users have been attracted and many implementations have been refreshed in different fields. Especially in the cryptocurrency investment field, blockchain technology has shown vigorous vitality. However, along with the rise of online business, numerous fraudulent activities, e.g., money laundering, bribery, phishing, and others, emerge as the main threat to trading security. Due to the openness of Ethereum, researchers can easily access Ethereum transaction records and smart contracts, which brings unprecedented opportunities for Ethereum scams detection and analysis. This paper mainly focuses on the Ponzi scheme, a typical fraud, which has caused large property damage to the users in Ethereum. By verifying Ponzi contracts to maintain Ethereum’s sustainable development, we model Ponzi scheme identification and detection as a node classification task. In this paper, we first collect target contracts’ transactions to establish transaction networks and propose a detecting model based on graph convolutional network (GCN) to precisely distinguish Ponzi contracts. Experiments on different real-world Ethereum datasets demonstrate that our proposed model has promising results compared with general machine learning methods to detect Ponzi schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Etherscan: etherscan.io.

  2. 2.

    Xblock: http://xblock.pro/ethereum/.

  3. 3.

    OpenNE: github.com/thunlp/openne.

  4. 4.

    https://github.com/tkipf/gcn.

References

  1. Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)

    Google Scholar 

  2. Buterin, V., et al.: A next-generation smart contract and decentralized application platform, white paper, vol. 3, no. 37 (2014)

    Google Scholar 

  3. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32 (2014)

    Google Scholar 

  4. Wu, K.: An empirical study of blockchain-based decentralized applications. arXiv preprint arXiv:1902.04969 (2019)

  5. Frankel, T.: The Ponzi Scheme Puzzle: A History and Analysis of Con Artists and Victims. Oxford University Press (2012)

    Google Scholar 

  6. Vasek, M., Moore, T.: There’s no free lunch, even using bitcoin: tracking the popularity and profits of virtual currency scams. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 44–61. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_4

    Chapter  Google Scholar 

  7. Juels, A., Kosba, A., Shi, E.: The ring of Gyges: investigating the future of criminal smart contracts. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 283–295 (2016)

    Google Scholar 

  8. Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin Ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 75–84. IEEE (2018)

    Google Scholar 

  9. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp. 1409–1418 (2018)

    Google Scholar 

  10. Chen, W., Zheng, Z., Ngai, E.C.-H., Zheng, P., Zhou, Y.: Exploiting blockchain data to detect smart Ponzi schemes on Ethereum. IEEE Access 7, 37575–37586 (2019)

    Article  Google Scholar 

  11. Hahn, C., Wons, A.: Initial Coin Offering (ICO): Unternehmensfinanzierung auf Basis der Blockchain-Technologie. Springer, Wiesbaden (2018). https://doi.org/10.1007/978-3-658-21787-7

    Book  Google Scholar 

  12. Morris, D.Z.: The rise of cryptocurrency Ponzi Schemes. The Atlantic, 31 May 2017

    Google Scholar 

  13. Kondor, D., Pósfai, M., Csabai, I., Vattay, G.: Do the rich get richer? An empirical analysis of the bitcoin transaction network. PLOS ONE 9(2), e86197 (2014)

    Google Scholar 

  14. Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Fut. Gener. Comput. Syst. 102, 259–277 (2020)

    Article  Google Scholar 

  15. Fan, S., Fu, S., Xu, H., Zhu, C.: Expose your mask: smart Ponzi schemes detection on blockchain. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–7. IEEE (2020)

    Google Scholar 

  16. Cai, H., Zheng, V.W., Chang, K.C.-C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616–1637 (2018)

    Article  Google Scholar 

  17. Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710 (2014)

    Google Scholar 

  18. Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 855–864 (2016)

    Google Scholar 

  19. Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: International Conference on Learning Representations (ICLR) (2017)

    Google Scholar 

  20. Tang, J., Qu, J., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web, pp. 1067–1077 (2015)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank all the members in the IVSN Research Group, Zhejiang University of Technology for the valuable discussions about the ideas and technical details presented in this paper. This work was partially supported by the National Key R&D Program of China under Grant No. 2020YFB1006104, by the National Natural Science Foundation of China under Grant No. 61973273, by the Zhejiang Provincial Natural Science Foundation of China under Grant No. LR19F030001, by the Ministry of Public Security’s Research Project “Research and Demonstration Application of Key Technologies of Criminal Social Network Model”, and by the Special Scientific Research Fund of Basic Public Welfare Profession of Zhejiang Province under Grant LGF20F020016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Xuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, S., Jin, J., Xie, Y., Shen, J., Xuan, Q. (2021). Ponzi Scheme Detection in Ethereum Transaction Network. In: Dai, HN., Liu, X., Luo, D.X., Xiao, J., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2021. Communications in Computer and Information Science, vol 1490. Springer, Singapore. https://doi.org/10.1007/978-981-16-7993-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7993-3_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7992-6

  • Online ISBN: 978-981-16-7993-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics