Detecting phishing scams on ethereum based on transaction records

Qi Yuan, Baoying Huang, Jie Zhang, Jiajing Wu*, Haonan Zhang, Xi Zhang

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

76 引用 (Scopus)

摘要

With the increasing popularity of blockchain technology, it has also become a hotbed of various cybercrimes. As a traditional way of scam, the phishing scam has new means of scam in the blockchain scenario and swindles a lot of money from users. In order to create a safe environment for investors, an efficient method for phishing detection is urgently needed. In this paper, we propose a three steps framework to detect phishing scams on Ethereum by mining Ethereum transaction records. First, we obtain the labeled phishing accounts and corresponding transaction records from two authorized websites. According to the collected transaction records we build an Ethereum transaction network. Then, a network embedding method node2vec which can extract the latent features of accounts is used for subsequent phishing classification. Finally, to distinguish whether the account is a phishing account, we adopt the one-class support vector machine (SVM) to classify. The experimental result demonstrates that F-score of our phishing detection method can achieve 0.846, which verifies the validity of our model. To the best of our knowledge, this is the first work that investigates the phishing scams on Ethereum based on transaction records.

源语言英语
主期刊名2020 IEEE International Symposium on Circuits and Systems, ISCAS 2020 - Proceedings
出版商Institute of Electrical and Electronics Engineers Inc.
ISBN(电子版)9781728133201
出版状态已出版 - 2020
活动52nd IEEE International Symposium on Circuits and Systems, ISCAS 2020 - Virtual, Online
期限: 10 10月 202021 10月 2020

出版系列

姓名Proceedings - IEEE International Symposium on Circuits and Systems
2020-October
ISSN(印刷版)0271-4310

会议

会议52nd IEEE International Symposium on Circuits and Systems, ISCAS 2020
Virtual, Online
时期10/10/2021/10/20

指纹

探究 'Detecting phishing scams on ethereum based on transaction records' 的科研主题。它们共同构成独一无二的指纹。

引用此