Skip to main content

A Survey on Ethereum Illicit Detection

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

Abstract

In recent years, blockchain technology has developed rapidly and has been widely used in finance, healthcare, and energy. As the 2.0 version of the blockchain, Ethereum has been seen as the mainstream smart contract development and operation platform, which attracted the attention of criminals. Many Ethereum financial crimes have occurred from time to time, making the Ethereum trading environment facing serious security problems. The safety supervision of the blockchain cannot be delayed. Among them, the detection and early warning of illicit transactions has become the top priority. Traditional machine learning, graph embedding, deep learning and other machine learning methods have all been used for illicit detection. The paper introduces a comprehensive investigation of illicit detection on Ethereum using machine learning technology, it has two sides: one is from the perspective of Ethereum transaction data, using general detection methods; the other is for specific types of illicit transactions detection (Including Ponzi schemes and honeypot contracts). For each transaction type, summarized relevant research ideas, model establishment and evaluation effects. Finally, the paper analyzes the general trend of the current Ethereum illicit detection research, and looks forward to the future research directions and challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, H., Ruan, N., Liu, H.: Ethereum analysis via node clustering. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 114–129. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36938-5_7

    Chapter  Google Scholar 

  2. Chen, T., Cao, R., Li, T.: SODA: A generic online detection framework for smart contracts. In: Network and Distributed System Security Symposium (2020)

    Google Scholar 

  3. Chen, T., et al.: An Adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 3–24. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72359-4_1

    Chapter  Google Scholar 

  4. Liang, G., Wang, Q., Xin, J.: Overview of mobile edge computing resource allocation. J. Inf. Secur. 6(03), 227–256 (2021)

    Google Scholar 

  5. Chen, T., Zhang, Y., Li, Z.: TokenScope: automatically detecting inconsistent behaviors of cryptocurrency tokens in Ethereum. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1503–1520 (2019)

    Google Scholar 

  6. Ibrahim, R.F., Elian, A.M., Ababneh, M.: Illicit account detection in the Ethereum blockchain using machine learning. In: 2021 International Conference on Information Technology (ICIT), pp. 488–493 (2021)

    Google Scholar 

  7. Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the Ethereum blockchain. Expert Syst. Appl. 150, 113318 (2020)

    Article  Google Scholar 

  8. Wu, L., Wu, S., Zhou, Y., et al.: EthScope: a transaction-centric security analytics framework to detect malicious smart contracts on ethereum. arXiv:2005.08278 (2020)

  9. Liu, X., Tang, Z., Li, P.: A graph learning based approach for identity inference in DApp platform blockchain. IEEE Trans. Emerg. Top. Comput. (2020). https://doi.org/10.1109/TETC.2020.3027309

    Article  Google Scholar 

  10. Kalejahi, B.K., Eminov, R., Guliyev, A.: Using blockchain technology in mobile network to create decentralized home location registry (HLR). Comput. Syst. Sci. Eng. 39(2), 287–296 (2021)

    Article  Google Scholar 

  11. Hu, T., Liu, X., Chen, T.: Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manage. 58(2), 102462 (2021)

    Article  Google Scholar 

  12. Sai, K., Tipper, D.: Disincentivizing double spend attacks across interoperable blockchains. In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, pp. 36–45 (2019)

    Google Scholar 

  13. O’kane, E.: Detecting patterns in the Ethereum transactional data using unsupervised learning. Trinity College, Dublin, Ireland (2018)

    Google Scholar 

  14. Gao, Z., Jiang, L., Xia, X.: Checking smart contracts with structural code embedding. IEEE Trans. Softw. Eng. (2020). https://doi.org/10.1109/TSE.2020.2971482

    Article  Google Scholar 

  15. Signorini, M., Pontecorvi, M., Kanoun, W., et al.: BAD: blockchain anomaly detection. arXiv:1807.03833 (2018)

  16. Grech, N., Kong, M., Jurisevic, A.: MadMax: surviving out-of-gas conditions in Ethereum smart contracts. In: Proceedings of the ACM on Programming Languages 2 (OOPSLA), pp. 1–27 (2018)

    Google Scholar 

  17. Ashizawa, N., Yanai, N., Cruz, J.P.: Learning contract-wide code representations for vulnerability detection on Ethereum smart contracts. IEICE Technical Report, vol. 120, no. 411, pp. 273–280 (2021)

    Google Scholar 

  18. Praitheeshan, P., Pan, L., Yu, J., et al.: Security analysis methods on Ethereum smart contract vulnerabilities: a survey. arXiv:1908.08605 (2019)

  19. Samreen, N.F., Alalfi, M.H.: SmartScan: an approach to detect denial of service vulnerability in Ethereum smart contracts. arXiv:2105.02852 (2021)

  20. Liu, C., Liu, H., Cao, Z.: ReGuard: finding reentrancy bugs in smart contracts. In: 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), pp. 65–68 (2018)

    Google Scholar 

  21. Huang, Y., Bian, Y., Li, R.: Smart contract security: a software lifecycle perspective. IEEE Access 7, 150184–150202 (2019)

    Article  Google Scholar 

  22. Sayeed, S., Marco-Gisbert, H., Caira, T.: Smart contract: attacks and protections. IEEE Access 8, 24416–24427 (2020)

    Article  Google Scholar 

  23. Baek, H., Oh, J., Kim, C.Y.: A model for detecting cryptocurrency transactions with discernible purpose. In: 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), pp. 713–717 (2019)

    Google Scholar 

  24. Sachan, R.K., Agarwal, R., Shukla, S.K.: Identifying malicious accounts in blockchains using domain names and associated temporal properties. arXiv:2106.13420 (2021)

  25. Poursafaei, F., Hamad, G.B., Zilic, Z.: Detecting malicious Ethereum entities via application of machine learning classification. In: 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp. 120–127 (2020)

    Google Scholar 

  26. Chen, W., Zheng, Z., Cui, J.: Detecting Ponzi schemes on Ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, pp. 1409–1418 (2018)

    Google Scholar 

  27. Chen, W., Zheng, Z., Ngai, E.C.: Exploiting blockchain data to detect smart Ponzi schemes on ethereum. IEEE Access 7, 37575–37586 (2019)

    Article  Google Scholar 

  28. Sun, W., Xu, G., Yang, Z.: Early Detection of smart Ponzi scheme contracts based on behavior forest similarity. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), pp. 297–309 (2020)

    Google Scholar 

  29. Jung, E., Tilly, L., Gehani, M.A.: Data mining-based Ethereum fraud detection. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 266–273 (2019)

    Google Scholar 

  30. Fan, S., Fu, S., Xu, H.: Expose your mask: smart Ponzi schemes detection on blockchain. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–7 (2020)

    Google Scholar 

  31. Bian, L., Zhang, L., Zhao, K.: Image-based scam detection method using an attention capsule network. IEEE Access 9, 33654–33665 (2021)

    Article  Google Scholar 

  32. Wang, L., Cheng, H., Zheng, Z., et al.: Ponzi scheme detection via oversampling-based Long Short-Term Memory for smart contracts. Knowl.-Based Syst. 228, 107312 (2021)

    Article  Google Scholar 

  33. Bartoletti, M., Carta, S., Cimoli, T.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Futur. Gener. Comput. Syst. 102, 259–277 (2020)

    Article  Google Scholar 

  34. Zhang, Y., Yu, W., Li, Z.: Detecting Ethereum Ponzi schemes based on improved lightGBM algorithm. IEEE Trans. Comput. Soc. Syst. (2021). https://doi.org/10.1109/TCSS.2021.3088145

    Article  Google Scholar 

  35. Torres, C.F., Steichen, M.: The art of the scam: demystifying honeypots in ethereum smart contracts. In: 28th {USENIX} security symposium ({USENIX} security 19), pp. 1591–1607 (2019)

    Google Scholar 

  36. Camino, R., Torres, C.F., Baden, M.: A data science approach for detecting honeypots in ethereum. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–9 (2020)

    Google Scholar 

  37. Chen, W., Guo, X., Chen, Z., et al.: Honeypot contract risk warning on ethereum smart contracts. In: 2020 IEEE International Conference on Joint Cloud Computing, pp. 1–8. IEEE (2020)

    Google Scholar 

  38. Nakamoto, S.B.: A peer-to-peer electronic cash system (2008)

    Google Scholar 

  39. Marie, V., Tyler, M., Marie, V., et al.: Analyzing the bitcoin Ponzi scheme ecosystem. In: International Conference on Financial Cryptography and Data Security; Workshop on Bitcoin and Blockchain Research; Workshop on Advances in Secure Electronic Voting Schemes; Workshop on Trusted Smart Contracts. Computer Science, University of New Mexico, Albuquerque, USA; Tandy School of Computer Science, The University of Tulsa, Tulsa, USA (2018)

    Google Scholar 

  40. Sahu, P., Singh, S.K., Singh, K.A.: Blockchain based secure solution for cloud storage: a model for synchronizing Industry 4.0 and IIoT. J. Cyber Secur. 3(2), 107–115 (2021)

    Article  Google Scholar 

  41. Khonde, S.R., Ulagamuthalvi, V.: Blockchain: secured solution for signature transfer in distributed intrusion detection system. Comput. Syst. Sci. Eng. 40(1), 37–51 (2022)

    Article  Google Scholar 

  42. Wang, P., Susilo, W.: Data security storage model of the internet of things based on blockchain. Comput. Syst. Sci. Eng. 36(1), 213–224 (2021)

    Article  Google Scholar 

  43. Devi, I., Karpagam, G.: Energy-aware scheduling for tasks with target-time in blockchain based data centres. Comput. Syst. Sci. Eng. 40(2), 405–419 (2022)

    Article  Google Scholar 

  44. Aslam, T., Maqbool, A., Akhtar, M., Mirza, A., Khan, M.A.: Blockchain based enhanced ERP transaction integrity architecture and poet consensus. Comput. Mater. Contin. 70(1), 1089–1109 (2022)

    Google Scholar 

Download references

Acknowledgement

The work is supported by 2020 Scientific Research Project of Jiangsu Police Academy: Blockchain supervision technology research (2020SJYZR02) and 2021 General Project of Philosophy and Social Science Research in Jiangsu Universities: Research on the Construction of Social Credit System Based on Blockchain (2021SJA0497).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, M. (2022). A Survey on Ethereum Illicit Detection. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics