Loading [MathJax]/extensions/MathMenu.js
Code Will Speak: Early detection of Ponzi Smart Contracts on Ethereum | IEEE Conference Publication | IEEE Xplore

Code Will Speak: Early detection of Ponzi Smart Contracts on Ethereum


Abstract:

The prevalence of Bitcoin has attracted a mass of investors into the blockchain ecosystem. Unfortunately, benefiting from its anonymity and immutability, scammers deploy ...Show More

Abstract:

The prevalence of Bitcoin has attracted a mass of investors into the blockchain ecosystem. Unfortunately, benefiting from its anonymity and immutability, scammers deploy various traps in smart contracts to exploit other participants and seize illegal proceeds. To identify smart Ponzi contracts-a classic fraud widely popular on Ethereum, previous studies present several machine learning-based models with considerable accuracy. However, the performance of their models relies on the behavioral features of smart contracts to a large margin, which are extracted from the transaction records only after a contract has been running for some time. In this paper, we borrow ideas from text feature extraction from Natural Language Processing (NLP) to build a classification model based on an improved CatBoost algorithm. A novel feature extraction pattern is applied in our model to deeply mine the logic of smart contract code. This approach can be used to detect Ponzi schemes at deployment time with improved performance, and thus can avoid the loss of investors originally.
Date of Conference: 05-10 September 2021
Date Added to IEEE Xplore: 15 November 2021
ISBN Information:

ISSN Information:

Conference Location: Chicago, IL, USA

Funding Agency:

References is not available for this document.

I. Introduction

During the past ten years since the birth of Bitcoin in 2009 [1], the investors have witnessed the prosperity of the Internet as a carrier of information transmission, raising great expectations on the blockchain, which is praised as the next generation of the Internet. The essence of Blockchain lies in its helping participants to reach a consensus without authoritative third parties and ensuring the anonymity of its users. However, the characteristics of decentralization and anonymity have also made the blockchain become a chaotic ground with nourishing frauds and other illegal activities [2].

Select All
1.
Bitcoin: A Peer-to-Peer Electronic Cash System, [online] Available: https://bitcoin.org/bitcoin.pdfJ.
2.
C. Weili and Z. Zibin, "Blockchain data analysis: A review of status trends and challenges", Journal of Computer Research and Development, vol. 55, no. 9, pp. 1853, 2018.
3.
V. Buterin, Ethereum: a next generation smart contract and decentralized application platform, 2013, [online] Available: https://github.com/ethereum/wiki/wiki/White-Paper.
4.
M. Vasek and T. Moore, "There’s no free lunch even using bitcoin: Tracking the popularity and profits of virtual currency scams" in Financial Cryptography and Data Security, Berlin, Heidelberg:Springer Berlin Heidelberg, pp. 44-61, 2015.
5.
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, et al., "A fistful of bitcoins: Characterizing payments among men with no names", Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127-140, 2013, [online] Available: https://doi.org/10.1145/2504730.2504747.
6.
M. Bartoletti, S. Carta, T. Cimoli and R. Saia, "Dissecting Ponzi schemes on Ethereum: identification analysis and impact", 2017.
7.
W. Chen, Z. Zheng, J. Cui, E. Ngai, P. Zheng and Y. Zhou, "Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology", World Wide Web Conference, pp. 1409-1418.
8.
E. Jung, M. Le Tilly, A. Gehani and Y. Ge, "Data mining-based ethereum fraud detection", 2019 IEEE International Conference on Blockchain (Blockchain), pp. 266-273, July 2019.
9.
C. Konstantinos and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things", IEEE Access, vol. 4, pp. 2292-2303, 2016.
10.
J. Ari, A. Kosba and E. Shi, "The ring of Gyges: Investigating the future of criminal smart contracts", Proceedings of International Conference on Computer and Communications Security, pp. 283-295, 2016.
11.
W. Chen, Z. Zheng, E. C. -H. Ngai, P. Zheng and Y. Zhou, "Exploiting Blockchain Data to Detect Smart Ponzi Schemes on Ethereum", IEEE Access, vol. 7, pp. 37575-37586, 2019.
12.
C. F. Torres, M. Steichen and R. State, "The art of the scam: Demystifying honeypots in ethereum smart contracts" in , USA:USENIX Association, 2019.
13.
R. Camino, C. F. Torres and R. State, "A data science approach for honeypot detection in ethereum", 2019.
14.
W. Chen, X. Guo, Z. Chen, Z. Zheng, Y. Lu and Y. Li, "Honeypot contract risk warning on ethereum smart contracts", 2020 IEEE International Conference on Joint Cloud Computing, pp. 1-8, Aug 2020.
15.
J. Wu, Q. Yuan, D. Lin, W. You and Z. Zheng, "Who are the phishers? phishing scam detection on ethereum via network embedding", IEEE Transactions on Systems Man and Cybernetics: Systems, vol. PP, no. 99, pp. 1-11, 2020.
16.
N.V. Chawla, K.W. Bowyer, L.O. Hall et al., "SMOTE: synthetic minority over-sampling technique", J. Artif. Intell. Res., vol. 16, no. 1, pp. 321-357, 2002.
17.
G. Salton and C. T. Yu, "On the construction of effective vocabularies for information retrieval", 1973, [online] Available: https://doi.org/10.1145/951762.951766.
18.
N.V. Chawla, K.W. Bowyer, L.O. Hall et al., "SMOTE: synthetic minority over-sampling technique", J. Artif. Intell. Res., vol. 16, no. 1, pp. 321-357, 2002.
19.
X. Liu, J. Wu and Z. Zhou, "Exploratory under-sampling for class-imbalance learning", Sixth International Conference on Data Mining (ICDM’06), pp. 965-969, 2006.
20.
L. Prokhorenkova, G. Gusev, A. Vorobev, A. V. Dorogush and A. Gulin, "Catboost: unbiased boosting with categorical features", 2017.
21.
T. Chen and C. Guestrin, "XGBoost: A scalable tree boosting system", Proceedings of International Conference on Knowledge Discovery and Data Mining, pp. 785-794, 2016.
22.
G. Ke, Q. Meng, T.W. Finley et al., "LightGBM: a highly efficient gradient boosting decision tree", Neural information processing systems, pp. 3149-3157, 2017.

Contact IEEE to Subscribe

References

References is not available for this document.