Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3485447.3512226acmconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article
Open access

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection

Published: 25 April 2022 Publication History
  • Get Citation Alerts
  • Abstract

    In recent years, phishing scams have become the most serious type of crime involved in Ethereum, the second-largest blockchain platform. The existing phishing scams detection technology on Ethereum mostly uses traditional machine learning or network representation learning to mine the key information from the transaction network to identify phishing addresses. However, these methods adopt the last transaction record or even completely ignore these records, and only manual-designed features are taken for the node representation. In this paper, we propose a Temporal Transaction Aggregation Graph Network (TTAGN) to enhance phishing scams detection performance on Ethereum. Specifically, in the temporal edges representation module, we model the temporal relationship of historical transaction records between nodes to construct the edge representation of the Ethereum transaction network. Moreover, the edge representations around the node are aggregated to fuse topological interactive relationships into its representation, also named as trading features, in the edge2node module. We further combine trading features with common statistical and structural features obtained by graph neural networks to identify phishing addresses. Evaluated on real-world Ethereum phishing scams datasets, our TTAGN (92.8% AUC, and 81.6% F1-score) outperforms the state-of-the-art methods, and the effectiveness of temporal edges representation and edge2node module is also demonstrated.

    References

    [1]
    Amr Ahmed, Nino Shervashidze, Shravan Narayanamurthy, Vanja Josifovski, and Alexander J Smola. 2013. Distributed large-scale natural graph factorization. In Proceedings of the 22nd international conference on World Wide Web. 37–48.
    [2]
    Israa Alqassem, Iyad Rahwan, and Davor Svetinovic. 2018. The anti-social system properties: Bitcoin network data analysis. IEEE Transactions on Systems, Man, and Cybernetics: Systems 50, 1(2018), 21–31.
    [3]
    N Anita and M Vijayalakshmi. 2019. Blockchain security attack: a brief survey. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 1–6.
    [4]
    Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral techniques for embedding and clustering. In Nips, Vol. 14. 585–591.
    [5]
    Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. Grarep: Learning graph representations with global structural information. In Proceedings of the 24th ACM international on conference on information and knowledge management. 891–900.
    [6]
    chainalysis. [n. d.]. 2021-Crypto-Crime-Report. https://go.chainalysis.com/2021-Crypto-Crime-Report.html. Accessed February, 2021.
    [7]
    Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys (CSUR) 53, 3 (2020), 1–43.
    [8]
    Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, and Zibin Zheng. 2020. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology (TOIT) 21, 1 (2020), 1–16.
    [9]
    Weili Chen, Xiongfeng Guo, Zhiguang Chen, Zibin Zheng, and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In IJCAI. 4506–4512.
    [10]
    Palash Goyal and Emilio Ferrara. 2018. Graph embedding techniques, applications, and performance: A survey. Knowledge-Based Systems 151 (2018), 78–94.
    [11]
    Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. 855–864.
    [12]
    William L Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 1025–1035.
    [13]
    Shuichiro Haruta, Hiromu Asahina, and Iwao Sasase. 2017. Visual similarity-based phishing detection scheme using image and CSS with target website finder. In GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, 1–6.
    [14]
    Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780.
    [15]
    Artsiom Holub and Jeremiah O’Connor. 2018. COINHOARDER: Tracking a ukrainian bitcoin phishing ring DNS style. In 2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 1–5.
    [16]
    Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems 30 (2017), 3146–3154.
    [17]
    Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907(2016).
    [18]
    Thomas N Kipf and Max Welling. 2016. Variational graph auto-encoders. arXiv preprint arXiv:1611.07308(2016).
    [19]
    Dan Lin, Jiajing Wu, Qi Yuan, and Zibin Zheng. 2020. Modeling and understanding ethereum transaction records via a complex network approach. IEEE Transactions on Circuits and Systems II: Express Briefs 67, 11(2020), 2737–2741.
    [20]
    Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. 2016. Asymmetric transitivity preserving graph embedding. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. 1105–1114.
    [21]
    Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. 701–710.
    [22]
    Sam T Roweis and Lawrence K Saul. 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 (2000), 2323–2326.
    [23]
    Ozgur Koray Sahingoz, Ebubekir Buber, Onder Demir, and Banu Diri. 2019. Machine learning based phishing detection from URLs. Expert Systems with Applications 117 (2019), 345–357.
    [24]
    Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. In Proceedings of the 24th international conference on world wide web. 1067–1077.
    [25]
    Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998–6008.
    [26]
    Petar Veličković, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903(2017).
    [27]
    Daixin Wang, Peng Cui, and Wenwu Zhu. 2016. Structural deep network embedding. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. 1225–1234.
    [28]
    Zeli Wang, Hai Jin, Weiqi Dai, Kim-Kwang Raymond Choo, and Deqing Zou. 2021. Ethereum smart contract security research: survey and future research opportunities. Frontiers of Computer Science 15, 2 (2021), 1–18.
    [29]
    Gavin Wood 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1–32.
    [30]
    Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2020. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems (2020).
    [31]
    Qi Yuan, Baoying Huang, Jie Zhang, Jiajing Wu, Haonan Zhang, and Xi Zhang. 2020. Detecting phishing scams on ethereum based on transaction records. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1–5.

    Cited By

    View all
    • (2024)Ethereum Phishing Scam Detection Based on Data Augmentation Method and Hybrid Graph Neural Network ModelSensors10.3390/s2412402224:12(4022)Online publication date: 20-Jun-2024
    • (2024)Multiscale Feature Fusion and Graph Convolutional Network for Detecting Ethereum Phishing ScamsElectronics10.3390/electronics1306101213:6(1012)Online publication date: 7-Mar-2024
    • (2024)Phishing behavior detection on different blockchains via adversarial domain adaptationCybersecurity10.1186/s42400-024-00237-57:1Online publication date: 19-Jun-2024
    • Show More Cited By

    Index Terms

    1. TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Conferences
            WWW '22: Proceedings of the ACM Web Conference 2022
            April 2022
            3764 pages
            ISBN:9781450390965
            DOI:10.1145/3485447
            This work is licensed under a Creative Commons Attribution International 4.0 License.

            Sponsors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 25 April 2022

            Check for updates

            Author Tags

            1. Blockchain
            2. Ethereum
            3. Network representation learning
            4. Phishing scams detection

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Funding Sources

            • the Strategic Priority Research Program of Chinese Academy of Sciences
            • The National Key Research and Development Program of China

            Conference

            WWW '22
            Sponsor:
            WWW '22: The ACM Web Conference 2022
            April 25 - 29, 2022
            Virtual Event, Lyon, France

            Acceptance Rates

            Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)1,013
            • Downloads (Last 6 weeks)148
            Reflects downloads up to 27 Jul 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Ethereum Phishing Scam Detection Based on Data Augmentation Method and Hybrid Graph Neural Network ModelSensors10.3390/s2412402224:12(4022)Online publication date: 20-Jun-2024
            • (2024)Multiscale Feature Fusion and Graph Convolutional Network for Detecting Ethereum Phishing ScamsElectronics10.3390/electronics1306101213:6(1012)Online publication date: 7-Mar-2024
            • (2024)Phishing behavior detection on different blockchains via adversarial domain adaptationCybersecurity10.1186/s42400-024-00237-57:1Online publication date: 19-Jun-2024
            • (2024)CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classificationCybersecurity10.1186/s42400-023-00194-57:1Online publication date: 1-Feb-2024
            • (2024)EtherShield: Time-interval Analysis for Detection of Malicious Behavior on EthereumACM Transactions on Internet Technology10.1145/363351424:1(1-30)Online publication date: 8-Jan-2024
            • (2024)When Crypto Economics Meet Graph Analytics and LearningCompanion Proceedings of the ACM on Web Conference 202410.1145/3589335.3651257(1186-1189)Online publication date: 13-May-2024
            • (2024)ZipZap: Efficient Training of Language Models for Large-Scale Fraud Detection on BlockchainProceedings of the ACM on Web Conference 202410.1145/3589334.3645352(2807-2816)Online publication date: 13-May-2024
            • (2024)Adaptive Attention-Based Graph Representation Learning to Detect Phishing Accounts on the Ethereum BlockchainIEEE Transactions on Network Science and Engineering10.1109/TNSE.2024.335508911:3(2963-2975)Online publication date: May-2024
            • (2024)Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain DataIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335900019(3038-3050)Online publication date: 1-Jan-2024
            • (2024)Toward Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum HeistsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334627619(1994-2009)Online publication date: 1-Jan-2024
            • Show More Cited By

            View Options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media