Survey on Ethereum phishing detection technology

With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing signi...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhao CAI, Tao JING, Shuang REN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023018
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529726132289536
author Zhao CAI
Tao JING
Shuang REN
author_facet Zhao CAI
Tao JING
Shuang REN
author_sort Zhao CAI
collection DOAJ
description With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.
format Article
id doaj-art-a4caec71db964e81ae1a46e6ea6483b2
institution Kabale University
issn 2096-109X
language English
publishDate 2023-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-a4caec71db964e81ae1a46e6ea6483b22025-01-15T03:16:17ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-04-019213259575927Survey on Ethereum phishing detection technologyZhao CAITao JINGShuang RENWith the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023018blockchainEthereumphishing detectiongraph neural network
spellingShingle Zhao CAI
Tao JING
Shuang REN
Survey on Ethereum phishing detection technology
网络与信息安全学报
blockchain
Ethereum
phishing detection
graph neural network
title Survey on Ethereum phishing detection technology
title_full Survey on Ethereum phishing detection technology
title_fullStr Survey on Ethereum phishing detection technology
title_full_unstemmed Survey on Ethereum phishing detection technology
title_short Survey on Ethereum phishing detection technology
title_sort survey on ethereum phishing detection technology
topic blockchain
Ethereum
phishing detection
graph neural network
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023018
work_keys_str_mv AT zhaocai surveyonethereumphishingdetectiontechnology
AT taojing surveyonethereumphishingdetectiontechnology
AT shuangren surveyonethereumphishingdetectiontechnology