Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology

被引:235
作者
Chen, Weili [1 ]
Zheng, Zibin [1 ,2 ]
Cui, Jiahui [1 ]
Ngai, Edith [3 ]
Zheng, Peilin [1 ]
Zhou, Yuren [1 ]
机构
[1] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Key Lab Machine Intelligence & Adv Comp, Minist Educ, Guangzhou, Guangdong, Peoples R China
[3] Uppsala Univ, Dept Informat Technol, Uppsala, Sweden
来源
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) | 2018年
基金
中国国家自然科学基金;
关键词
Blockchain; Smart Contract; Ponzi Schemes; Ethereum; SMART CONTRACTS;
D O I
10.1145/3178876.3186046
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Blockchain technology becomes increasingly popular. It also attracts scams, for example, Ponzi scheme, a classic fraud, has been found making a notable amount of money on Blockchain, which has a very negative impact. To help dealing with this issue, this paper proposes an approach to detect Ponzi schemes on blockchain by using data mining and machine learning methods. By verifying smart contracts on Ethereum, we first extract features from user accounts and operation codes of the smart contracts and then build a classification model to detect latent Ponzi schemes implemented as smart contracts. The experimental results show that the proposed approach can achieve high accuracy for practical use. More importantly, the approach can be used to detect Ponzi schemes even at the moment of its creation. By using the proposed approach, we estimate that there are more than 400 Ponzi schemes running on Ethereum. Based on these results, we propose to build a uniform platform to evaluate and monitor every created smart contract for early warning of scams.
引用
收藏
页码:1409 / 1418
页数:10
相关论文
共 43 条
[1]  
Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
[2]  
[Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
[3]  
[Anonymous], 2015, Lecture Notes in Business Information Processing, DOI DOI 10.1007/978-3-319-21915-8_1
[4]  
[Anonymous], 2017, ARXIV170303779
[5]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[6]  
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI [10.5663/aps.v1i1.10138, DOI 10.5663/APS.V1I1.10138]
[7]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[8]  
Chen T, 2017, 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), P442, DOI 10.1109/SANER.2017.7884650
[9]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[10]  
Christin N., 2013, Proceedings of the 22nd International Conference on World Wide Web, WWW'13, P213, DOI DOI 10.1145/2488388.2488408