Survey on Ethereum phishing detection technology

With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing signi...

Full description

Bibliographic Details
Main Author: Zhao CAI, Tao JING, Shuang REN
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-04-01
Series:网络与信息安全学报
Subjects:
Online Access:https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023018
_version_ 1797262520689360896
author Zhao CAI, Tao JING, Shuang REN
author_facet Zhao CAI, Tao JING, Shuang REN
author_sort Zhao CAI, Tao JING, Shuang REN
collection DOAJ
description With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.
first_indexed 2024-04-24T23:58:25Z
format Article
id doaj.art-7fc27372d0d64b72bc8cd433f025fd64
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-24T23:58:25Z
publishDate 2023-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-7fc27372d0d64b72bc8cd433f025fd642024-03-14T09:50:50ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2023-04-0192213210.11959/j.issn.2096-109x.2023018Survey on Ethereum phishing detection technologyZhao CAI, Tao JING, Shuang RENWith the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023018blockchainethereumphishing detectiongraph neural network
spellingShingle Zhao CAI, Tao JING, Shuang REN
Survey on Ethereum phishing detection technology
网络与信息安全学报
blockchain
ethereum
phishing detection
graph neural network
title Survey on Ethereum phishing detection technology
title_full Survey on Ethereum phishing detection technology
title_fullStr Survey on Ethereum phishing detection technology
title_full_unstemmed Survey on Ethereum phishing detection technology
title_short Survey on Ethereum phishing detection technology
title_sort survey on ethereum phishing detection technology
topic blockchain
ethereum
phishing detection
graph neural network
url https://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2023018
work_keys_str_mv AT zhaocaitaojingshuangren surveyonethereumphishingdetectiontechnology