Affiliation:
1. School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China
2. Data Security Governance Zhejiang Engineering Research Center, Hangzhou Dianzi University, Hangzhou 310018, China
Abstract
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen. Current methods of detecting phishing in Ethereum focus mainly on the transaction features and local network structure. However, these methods fail to account for the complexity of interactions between edges and the handling of large graphs. Additionally, these methods face significant issues due to the limited number of positive labels available. Given this, we propose a scheme that we refer to as the Bagging Multiedge Graph Convolutional Network to detect phishing scams on Ethereum. First, we extract the features from transactions and transform the complex Ethereum transaction network into three simple inter-node graphs. Then, we use graph convolution to generate node embeddings that leverage the global structural information of the inter-node graphs. Further, we apply the bagging strategy to overcome the issues of data imbalance and the Positive Unlabeled (PU) problem in transaction data. Finally, to evaluate our approach’s effectiveness, we conduct experiments using actual transaction data. The results demonstrate that our Bagging Multiedge Graph Convolutional Network (0.877 AUC) outperforms all of the baseline classification methods in detecting phishing scams on Ethereum.
Funder
“Pioneer” and “Leading Goose” R&D Program of Zhejiang
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference29 articles.
1. Chainalysis Team (2022, April 08). The 2022 Crypto Crime Report. Available online: https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/.
2. Onyema, E., Dinar, A., Ghouali, S., Merabet, B., Merzougui, R., and Feham, M. (2022). Security and Privacy in Cyberspace, Springer.
3. A survey and classification of web phishing detection schemes: Phishing is a fraudulent act that is used to deceive users;Varshney;Secur. Commun. Networks,2016
4. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites;Xiang;ACM Trans. Inf. Syst. Secur.,2011
5. Hybrid client side phishing websites detection approach;Kausar;Int. J. Adv. Comput. Sci. Appl.,2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献