skip to main content
research-article

Phishing Scams Detection in Ethereum Transaction Network

Published:17 December 2020Publication History
Skip Abstract Section

Abstract

Blockchain has attracted an increasing amount of researches, and there are lots of refreshing implementations in different fields. Cryptocurrency as its representative implementation, suffers the economic loss due to phishing scams. In our work, accounts and transactions are treated as nodes and edges, thus detection of phishing accounts can be modeled as a node classification problem. Correspondingly, we propose a detecting method based on Graph Convolutional Network and autoencoder to precisely distinguish phishing accounts. Experiments on different large-scale real-world datasets from Ethereum show that our proposed model consistently performs promising results compared with related methods.

References

  1. Shuichiro Haruta, Hiromu Asahina, and Iwao Sasase. 2017. Visual similarity-based phishing detection scheme using image and CSS with target Website finder. In 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017. IEEE, 1--6. https://doi.org/10.1109/GLOCOM.2017.8254506Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Neda Abdelhamid, Aladdin Ayesh, and Fadi A. Thabtah. 2014. Phishing detection-based associative classification data mining. Expert Syst. Appl. 41, 13 (2014), 5948--5959. DOI:https://doi.org/10.1016/j.eswa.2014.03.019Google ScholarGoogle ScholarCross RefCross Ref
  3. Amr Ahmed, Nino Shervashidze, Shravan M. Narayanamurthy, Vanja Josifovski, and Alexander J. Smola. 2013. Distributed large-scale natural graph factorization. In Proceedings of the 22nd International World Wide Web Conference (WWW’13). 37--48. DOI:https://doi.org/10.1145/2488388.2488393Google ScholarGoogle Scholar
  4. Moses Adebowale Akanbi, Khin T. Lwin, E. Sánchez, and M. Alamgir Hossain. 2019. Intelligent web-phishing detection and protection scheme using integrated features of images, frames and text. Expert Syst. Appl. 115 (2019), 300--313. DOI:https://doi.org/10.1016/j.eswa.2018.07.067Google ScholarGoogle ScholarCross RefCross Ref
  5. Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral techniques for embedding and clustering. In Proceedings of the Conference on Advances in Neural Information Processing Systems: Natural and Synthetic (NIPS’01). 585--591.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Bellingeri, D. Bevacqua, F. Scotognella, and D. Cassi. 2019. The heterogeneity in link weights may decrease the robustness of real-world complex weighted networks. Sci. Rep. 9, 1 (2019), 1--13.Google ScholarGoogle Scholar
  7. Stefano Boccaletti, Vito Latora, Yamir Moreno, Martin Chavez, and D.-U. Hwang. 2006. Complex networks: Structure and dynamics. Phys. Rep. 424, 4-5 (2006), 175--308.Google ScholarGoogle ScholarCross RefCross Ref
  8. Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. GraRep: Learning graph representations with global structural information. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management, (CIKM’15). 891--900. DOI:https://doi.org/10.1145/2806416.2806512Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2016. Deep neural networks for learning graph representations. In Proceedings of the 30th AAAI Conference on Artificial Intelligence. 1145--1152.Google ScholarGoogle ScholarCross RefCross Ref
  10. Andrew Carlson, Justin Betteridge, Bryan Kisiel, Burr Settles, Estevam R. Hruschka, and Tom M. Mitchell. 2010. Toward an architecture for never-ending language learning. In Proceedings of the 24th AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  11. Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen, and Yuren Zhou. 2019. Market manipulation of bitcoin: Evidence from mining the Mt. Gox transaction network. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’19). 964--972. DOI:https://doi.org/10.1109/INFOCOM.2019.8737364Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Weili Chen, Zibin Zheng, Edith Cheuk-Han Ngai, Peilin Zheng, and Yuren Zhou. 2019. Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 7 (2019), 37575--37586. DOI:https://doi.org/10.1109/ACCESS.2019.2905769Google ScholarGoogle ScholarCross RefCross Ref
  13. Kaize Ding, Jundong Li, Rohit Bhanushali, and Huan Liu. 2019. Deep anomaly detection on attributed networks. In Proceedings of the SIAM International Conference on Data Mining. SIAM, 594--602.Google ScholarGoogle ScholarCross RefCross Ref
  14. Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, and Yue Yang. 2019. Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism. IEEE Access 7 (2019), 56329--56340. DOI:https://doi.org/10.1109/ACCESS.2019.2913705Google ScholarGoogle ScholarCross RefCross Ref
  15. Palash Goyal and Emilio Ferrara. 2018. Graph embedding techniques, applications, and performance: A survey. Knowl.-Based Syst. 151 (2018), 78--94. DOI:https://doi.org/10.1016/j.knosys.2018.03.022Google ScholarGoogle ScholarCross RefCross Ref
  16. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 855--864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. John Guare. 1990. Six Degrees of Separation: A Play. Vintage.Google ScholarGoogle Scholar
  18. Yuexian Hou, Peng Zhang, Xingxing Xu, Xiaowei Zhang, and Wenjie Li. 2009. Nonlinear dimensionality reduction by locally linear inlaying. IEEE Trans. Neural Netw. 20, 2 (2009), 300--315. DOI:https://doi.org/10.1109/TNN.2008.2005582Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ankit Kumar Jain and B. B. Gupta. 2018. Towards detection of phishing websites on client-side using machine learning-based approach. Telecommun. Syst. 68, 4 (01 Aug 2018), 687--700. DOI:https://doi.org/10.1007/s11235-017-0414-0Google ScholarGoogle Scholar
  20. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In Advances in Neural Information Processing Systems. MIT Press, 3146--3154.Google ScholarGoogle Scholar
  21. Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. Retrieved from https://arXiv:1412.6980.Google ScholarGoogle Scholar
  22. Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. Retrieved from https://arXiv:1609.02907.Google ScholarGoogle Scholar
  23. Thomas N. Kipf and Max Welling. 2016. Variational graph auto-encoders. Retrieved from https://arxiv:1611.07308.Google ScholarGoogle Scholar
  24. Balaji Krishnapuram, Mohak Shah, Alexander J. Smola, Charu C. Aggarwal, Dou Shen, and Rajeev Rastogi (Eds.). 2016. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM. DOI:https://doi.org/10.1145/2939672Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Solomon Kullback and Richard A Leibler. 1951. On information and sufficiency. Ann. Math. Stat. 22, 1 (1951), 79--86.Google ScholarGoogle ScholarCross RefCross Ref
  26. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436--444.Google ScholarGoogle Scholar
  27. Qimai Li, Zhichao Han, and Xiao-Ming Wu. 2018. Deeper insights into graph convolutional networks for semi-supervised learning. In Proceedings of the 32nd AAAI Conference on Artificial Intelligence (AAAI’18), the 30th Innovative Applications of Artificial Intelligence (IAAI’18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI’18). 3538--3545.Google ScholarGoogle Scholar
  28. Yukun Li, Zhenguo Yang, Xu Chen, Huaping Yuan, and Wenyin Liu. 2019. A stacking model using URL and HTML features for phishing webpage detection. Future Gen. Comput. Syst. 94 (2019), 27--39. DOI:https://doi.org/10.1016/j.future.2018.11.004Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, and Le Song. 2018. Heterogeneous graph neural networks for malicious account detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM’18). 2077--2085. DOI:https://doi.org/10.1145/3269206.3272010Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, and Zhenkai Liang. 2019. Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wireless Comm. Netw. 2019 (2019), 43. DOI:https://doi.org/10.1186/s13638-019-1361-0Google ScholarGoogle ScholarCross RefCross Ref
  31. Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. Retrieved from https://arXiv:1301.3781.Google ScholarGoogle Scholar
  32. Satoshi Nakamoto and A. Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdf4.Google ScholarGoogle Scholar
  33. Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. 2016. Asymmetric transitivity preserving graph embedding. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1105--1114. DOI:https://doi.org/10.1145/2939672.2939751Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 701--710.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Marc Pilkington. 2016. Blockchain technology: principles and applications. In Research Handbook on Digital Transformations. Edward Elgar Publishing.Google ScholarGoogle Scholar
  36. Jiezhong Qiu, Jian Tang, Hao Ma, Yuxiao Dong, Kuansan Wang, and Jie Tang. 2018. DeepInf: Social influence prediction with deep learning. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery 8 Data Mining (KDD’18). 2110--2119. DOI:https://doi.org/10.1145/3219819.3220077Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Routhu Srinivasa Rao and Alwyn Roshan Pais. 2019. Jail-Phish: An improved search engine-based phishing detection system. Comput. Secur. 83 (2019), 246--267. DOI:https://doi.org/10.1016/j.cose.2019.02.011Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Yu Rong, Wenbing Huang, Tingyang Xu, and Junzhou Huang. 2019. The truly deep graph convolutional networks for node classification. Retrieved from https://arxiv:1907.10903.Google ScholarGoogle Scholar
  39. Ozgur Koray Sahingoz, Ebubekir Buber, Önder Demir, and Banu Diri. 2019. Machine learning-based phishing detection from URLs. Expert Syst. Appl. 117 (2019), 345--357. DOI:https://doi.org/10.1016/j.eswa.2018.09.029Google ScholarGoogle ScholarCross RefCross Ref
  40. Nick Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (1997).Google ScholarGoogle Scholar
  41. Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. LINE: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web (WWW’15). 1067--1077. DOI:https://doi.org/10.1145/2736277.2741093Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 6684 (1998), 440.Google ScholarGoogle Scholar
  43. Emma J. Williams and Danielle Polage. 2019. How persuasive is phishing email? The role of authentic design, influence and current events in email judgements. Behav. IT 38, 2 (2019), 184--197. DOI:https://doi.org/10.1080/0144929X.2018.1519599Google ScholarGoogle ScholarCross RefCross Ref
  44. Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2019. Who are the phishers? Phishing scam detection on ethereum via network embedding. Retrieved from https://arXiv:1911.09259.Google ScholarGoogle Scholar
  45. Guanhua Yan, Stephan Eidenbenz, and Emanuele Galli. 2009. SMS-watchdog: Profiling social behaviors of SMS users for anomaly detection. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID’09). 202--223. DOI:https://doi.org/10.1007/978-3-642-04342-0_11Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Tom Young, Devamanyu Hazarika, Soujanya Poria, and Erik Cambria. 2018. Recent trends in deep learning-based natural language processing. IEEE Comput. Intell. Mag. 13, 3 (2018), 55--75.Google ScholarGoogle ScholarCross RefCross Ref
  47. Y. Yuan and F. Wang. 2018. Blockchain and cryptocurrencies: Model, techniques, and applications. IEEE Trans. Syst. Man Cybernet.: Syst. 48, 9 (Sep. 2018), 1421--1428. DOI:https://doi.org/10.1109/TSMC.2018.2854904Google ScholarGoogle ScholarCross RefCross Ref
  48. Xi Zhang, Zhiwei Yan, Hongtao Li, and Guanggang Geng. 2017. Chinese journal of network and information security. Res. Phish. Detect. Technol. 7 (2017).Google ScholarGoogle Scholar
  49. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Services 14, 4 (2018), 352--375. DOI:https://doi.org/10.1504/IJWGS.2018.10016848Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Phishing Scams Detection in Ethereum Transaction Network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 21, Issue 1
        Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
        February 2021
        534 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3441681
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 December 2020
        • Online AM: 7 May 2020
        • Accepted: 1 May 2020
        • Revised: 1 February 2020
        • Received: 1 October 2019
        Published in toit Volume 21, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format