Author:
Han Beibei,Wei Yingmei,Wang Qingyong,Collibus Francesco Maria De,Tessone Claudio J.
Abstract
AbstractIn recent years, a surge of criminal activities with cross-cryptocurrency trades have emerged in Ethereum, the second-largest public blockchain platform. Most of the existing anomaly detection methods utilize the traditional machine learning with feature engineering or graph representation learning technique to capture the information in transaction network. However, these methods either ignore the timestamp information and the transaction flow direction information in transaction network or only consider single transaction network, the cross-cryptocurrency trading patterns in Ethereum are usually ignored. In this paper, we introduce a Multi-layer Temporal Transaction Anomaly Detection (MT$$^2$$
2
AD) model in Ethereum network with graph neural network. Specifically, for a given Ethereum token transaction network, we first extract its initial features including the structure subgraph and edge’s feature. Then, we model the temporal information in subgraph as a series of network snapshots according to the timestamp on each edge and time window. To capture the cross-cryptocurrency trading patterns, we combine the snapshots from multiple token transactions at a given timestamp, and we consider it as a new combined graph. We further use the graph convolution encoder with attention mechanism and pooling operation on this new graph to obtain the graph-level embedding, and we transform the anomaly detection on dynamic multi-layer Ethereum transaction networks as a graph classification task with these graph-level embeddings. MT$$^2$$
2
AD can integrate the transaction structure feature, edge’s feature and cross-cryptocurrency trading patterns into a framework to perform the anomaly detection with graph neural networks. Experiments on three real-world multi-layer transaction networks show that the proposed MT$$^2$$
2
AD (0.8789 Precision, 0.9375 Recall, 0.4987 FbMacro and 0.9351 FbWeighted) can achieve the best performance on most evaluation metrics in comparison with some competing approaches, and the effectiveness in consideration of multiple tokens is also demonstrated.
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Engineering (miscellaneous),Information Systems,Artificial Intelligence
Reference40 articles.
1. Wang Z, Jin H, Dai W, Choo K-KR, Zou D (2021) Ethereum smart contract security research: survey and future research opportunities. Front Comp Sci 15:1–18
2. Chen H, Pendleton M, Njilla L, Xu S (2020) A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput Surv 53(3):1–43
3. Xu J, Livshits B (2019) The anatomy of a cryptocurrency pump-and-dump scheme. In: Proceedings of the 28th USENIX conference on security symposium. SEC’19. USENIX Association, USA, pp 1609–1625
4. Li S, Gou G, Liu C, Hou C, Li Z, Xiong G (2022) Ttagn: temporal transaction aggregation graph network for ethereum phishing scams detection. In: Proceedings of the ACM Web conference 2022. WWW ’22. Association for Computing Machinery, New York, NY, USA, pp. 661–669
5. Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020) Phishing scams detection in ethereum transaction network. ACM Trans Internet Technol 21(1):1–16
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献