Author:
Yan Chuyi,Han Xueying,Zhu Yan,Du Dan,Lu Zhigang,Liu Yuling
Abstract
AbstractDespite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge of limited intelligence in the early stages of new chains, we propose ADA-Spear-an automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection. The model effectively identifies phishing behavior in new chains with limited reliable labels, addressing challenges such as significant distribution drift, low attribute overlap, and limited inter-chain connections. Our approach includes a subgraph construction strategy to align heterogeneous chains, a layered deep learning encoder capturing both temporal and spatial information, and integrated adversarial domain adaptive learning in end-to-end model training. Validation in Ethereum, Bitcoin, and EOSIO environments demonstrates ADA-Spear’s effectiveness, achieving an average F1 score of 77.41 on new chains after knowledge transfer, surpassing existing detection methods.
Funder
National Key Research and Development Program of China
Foundation Strengthening Program Technical Area Fund
technological project funding of the State Grid Corporation of China
Youth Innovation Promotion Association CAS
the Strategic Priority Research Program of Chinese Academy of Sciences
National Natural Science Foundation of China
the Program of Key Laboratory of Network Assessment Technology
the Chinese Academy of Sciences, Program of Beijing Key Laboratory of Network Security and Protection Technolog
Publisher
Springer Science and Business Media LLC
Reference60 articles.
1. Aggarwal CC et al (2015) Data mining: the textbook, vol 1
2. Ao X, Liu Y, Qin Z, Sun Y, He Q (2021) Temporal high-order proximity aware behavior analysis on Ethereum. World Wide Web 24:1–21
3. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: International conference on machine learning. PMLR, pp 214–223
4. Chainanalysis: The 2022 Crypto Crime Report. https://go.chainalysis.com/rs/503-FAP-074/images/Crypto-Crime-Report-2022.pdf
5. Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020a) Phishing scams detection in Ethereum transaction network. ACM Trans Internet Technol (TOIT) 21(1):1–16