Skip to main content
Log in

Temporal high-order proximity aware behavior analysis on Ethereum

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Ethereum, the most popular public blockchain with the capability of smart contracts and the cryptocurrency Ether, is escalating in the number of account addresses and transactions since its birth. Due to the decentralisation of the Ethereum blockchain and the anonymity of its users, Ethereum serves as a noteworthy environment for malicious activities that are difficult to unearth. As a result, understanding the behaviors of the account addresses on Ethereum has become an imperative problem receiving much attention very recently. Existing works for such task mainly rely on extracting statistical features of account addresses and applying machine learning techniques to group or identify them. However, seldom prevailing approaches take temporal information and high-order interactions among the account addresses into consideration. To this end, we propose a novel approach coined THCD (T emporal H igh-order proximity aware C ommunity D etection) for behavior analysis on Ethereum from the perspective of graph mining. First, frequent temporal motifs are mined over a transaction graph constructed by the Ethereum block transactions. Next, we define the high-order proximity between two accounts based on these temporal motif occurrences. Finally, a novel temporal motif-aware community detection method is devised to find account communities over the defined high-order proximity. Experiments on four real datasets constructed from Ethereum blocks demonstrate the effectiveness of our approach. Some discovered suspicious accounts are confirmed by real-world reports. Meanwhile, THCD is scalable to large-scale transaction datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. https://github.com/ethereum/wiki/wiki/White-Paper

  2. https://www.carbonblack.com/2018/06/07/carbon-black-threat-report-cryp_tocurrency-gold-rush-dark-web/

  3. A mixer is an online software service that can swap cryptocurrencies for ones with different transaction histories.

  4. https://medium.com/crypto-integrity/fake-volumes-in-cryptocurrency-markets-february-report-fec9329f1f98

References

  1. Abdelhamid, E., Canim, M., Sadoghi, M., Bhattacharjee, B., Chang, Y.C., Kalnis, P.: Incremental frequent subgraph mining on large evolving graphs. IEEE Transactions on Knowledge and Data Engineering (2017)

  2. Benson, A.R., Gleich, D.F., Leskovec, J.: Higher-order organization of complex networks. Science (2016)

  3. Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment (2008)

  4. Bogner, A.: Seeing is Understanding: Anomaly Detection in Blockchains with Visualized Features. In: Ubicomp (2017)

  5. Chen, T., Zhu, Y., Li, Z., Chen, J., Li, X., Luo, X., Lin, X., Zhange, X.: Understanding Ethereum via graph analysis. In: INFOCOM (2018)

  6. Chen, W., Zheng, Z., Cui, J., Ngai, E., Zheng, P., Zhou, Y.: Detecting ponzi schemes on Ethereum: Towards healthier blockchain technology. In: WWW (2018)

  7. Chen, W., Zheng, Z., Ngai, E.C., Zheng, P., Zhou, Y.: Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7, 37575–37586 (2019)

    Article  Google Scholar 

  8. Farrugia, S., Ellul, J., Azzopardi, G.: Detection of illicit accounts over the ethereum blockchain. Expert Syst. Appl. 150, 113318 (2020)

    Article  Google Scholar 

  9. Guimera, R., Amaral, L.A.N.: Functional cartography of complex metabolic networks. Nature (2005)

  10. Gurukar, S., Ranu, S., Ravindran, B.: Commit: a scalable approach to mining communication motifs from dynamic networks. In: SIGMOD (2015)

  11. Jian, X., Lian, X., Chen, L.: On efficiently detecting overlapping communities over distributed dynamic graphs. In: ICDE (2018)

  12. Jiang, Y., Huang, X., Cheng, H., Yu, J.X.: Vizcs: Online searching and visualizing communities in dynamic graphs. In: ICDE (2018)

  13. Kleinberg, B., Kamps, J.: To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science (2018)

  14. KUMARI, R., CATHERINE, M.: Anomaly detection in blockchain using clustering protocol. International Journal of Pure and Applied Mathematics (2018)

  15. Leskovec, J., Sosič, R.: Snap: A general-purpose network analysis and graph-mining library ACM Transactions on Intelligent Systems and Technology (TIST) (2016)

  16. Li, P.Z., Huang, L., Wang, C.D., Lai, J.H.: Edmot: an edge enhancement approach for motif-aware community detection. In: KDD (2019)

  17. Li, T., Shin, D., Wang, B.: Cryptocurrency pump-and-dump schemes. Available at SSRN 3267041 (2019)

  18. Lin, D., Wu, J., Yuan, Q., Zheng, Z.: Modeling and understanding ethereum transaction records via a complex network approach. IEEE Transactions on Circuits and Systems II:, Express Briefs, pp. 1–1 (2020)

  19. Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D., Alon, U.: Network motifs: simple building blocks of complex networks. Science (2002)

  20. Newman, M.E.: Finding community structure in networks using the eigenvectors of matrices. Physical review E (2006)

  21. O’Kane, E.: Detecting patterns in the ethereum transactional data using unsupervised learning. Master’s thesis, University of Dublin Trinity College (2018)

  22. Paranjape, A., Benson, A.R., Leskovec, J.: Motifs in temporal networks. In: WSDM (2017)

  23. SAYADI, S., REJEB, S.B., CHOUKAIR, Z.: Anomaly detection model over blockchain electronic transactions. In: IWCMC (2019)

  24. SINGH, A.: Anomaly Detection in the Ethereum Network. Master’s thesis, Indian Institute of Technology Kanpur (2019)

  25. Sun, H., Ruan, N., Liu, H.: Ethereum analysis via node clustering. In: ICNSS (2019)

  26. Tsourakakis, C.E., Pachocki, J., Mitzenmacher, M.: Scalable motif-aware graph clustering. In: WWW (2017)

  27. Weber, M., Domeniconi, G., Chen, J., Weidele, D.K.I., Bellei, C., Robinson, T., Leiserson, C.E.: Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. In: Workshop of KDD (2019)

  28. Wei, X., Lu, C., Ozcan, F.R., Chen, T., Wang, B., Wu, D., Tang, Q.: A behavior-aware profiling of smart contracts. In: International Conference on Security and Privacy in Communication Systems, pp. 245–258. Springer (2019)

  29. Xu, J., Livshits, B.: The anatomy of a cryptocurrency pump-and-dump scheme. In: {USENIX} Security Symposium (2019)

Download references

Acknowledgements

The research work is supported by the National Key Research and Development Program of China under Grant No.2017YFB1002104, the National Natural Science Foundation of China under Grant No. 92046003, 61976204, U1811461, 61672499, Key Special Project of Beijing Municipal Science & Technology Commission (Z181100003218018). Xiang Ao is also supported by the Project of Youth Innovation Promotion Association CAS and Beijing Nova Program Z201100006820062. We thank Haibo Zhou for his valuable suggestions for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiang Ao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Emerging Blockchain Applications and Technology

Guest Editors: Rui Zhang, C. Mohan, and Ermyas Abebe

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ao, X., Liu, Y., Qin, Z. et al. Temporal high-order proximity aware behavior analysis on Ethereum. World Wide Web 24, 1565–1585 (2021). https://doi.org/10.1007/s11280-021-00875-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-021-00875-6

Keywords

Navigation