Blockchain

Value-Driven Ethereum Transaction Tracing Rank Method

Expand
  • State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received date: 2024-01-10

  Online published: 2024-08-01

Abstract

Blockchain offers users anonymity and facilitates the decentralized transfer of value. However, malicious attackers might employ phishing or other fraudulent methods to steal assets and withdraw them from cryptocurrency exchanges by designing complex transaction interactions. In this paper, we address this challenge by presenting a valuedriven transaction tracking and ranking method tailored for Ethereum. In this approach, we collect a transaction dataset of up to 27 GB from 12 Ethereum attack cases with fraud amounts exceeding one million US dollars, and construct an address graph to describe the relationship between addresses. We then invoke token liquidity pool data from the onchain data to represent the historical price of assets and determine the weight coefficients for transactions in the graph. Finally, we introduce a dynamic residual scaling mechanism based on value proportion to optimize the address graph structure by optimal value flow paths. Experimental results show that the proposed method achieves a recall rate of 89.24%, which represents a notable improvement of 7%, 20%, and 37% over transaction tracing rank (TTR), APPR, and Haircut algorithms, respectively, confirming the effectiveness of the proposed method.

Cite this article

LEI Ming, LIN Yijing, GAO Zhipeng . Value-Driven Ethereum Transaction Tracing Rank Method[J]. Journal of Applied Sciences, 2024 , 42(4) : 629 -641 . DOI: 10.3969/j.issn.0255-8297.2024.04.006

References

[1] Caversaccio P M. Smart contract deployment statistics [EB/OL]. [2024-01-10]. https://dune.com/pcaversaccio/smart-contract-deployment-statistics.
[2] Chainalysis T. 2023 crypto crime: illicit cryptocurrency volumes reach all-time highs amid surge in sanctions designations and hacking [EB/OL]. [2024-01-10]. https://www.chainalysis.com/blog/2023-crypto-crime-report-introduction/.
[3] Ferretti S, D’angelo G. On the ethereum blockchain structure: a complex networks theory perspective [J]. Concurrency and Computation: Practice and Experience, 2020, 32(12): e5493.
[4] Chen T, Li Z H, Zhu Y X, et al. Understanding ethereum via graph analysis [J]. ACM Transactions on Internet Technology. 2020, 20(2): 1-32.
[5] Mascarenhas J Z G, Ziviani A, Wehmuth K, et al. On the transaction dynamics of the Ethereum-based cryptocurrency [J]. Journal of Complex Networks, 2020, 8(4): cnaa042.
[6] Khan A, Akcora C G. Graph-based management and mining of blockchain data [C]//31st ACM International Conference on Information & Knowledge Management, 2022: 5140-5143.
[7] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. 2008[2024-01-10]. https://bitcoin.org/en/bitcoin-paper.
[8] Reid F, Harrigan M. Security and privacy in social networks [M]. New York: Springer, 2013: 197-223.
[9] Zhao C, Guan Y. Advances in digital forensics XI [M]. Cham: Springer, 2015: 79-95.
[10] Heidari A, Bahrak B. A graph-based deep learning approach for illegal transaction etection in Bitcoin [EB/OL]. 2022[2024-01-10]. https://doi.org/10.21203/rs.3.rs-2194869/v1.
[11] Sun H, Ruan N, Liu H. Ethereum analysis via node clustering [C]//13th International Conference on Network and System Security, 2019: 114-129.
[12] Agarwal R, Barve S, Shukla S K. Detecting malicious accounts in permissionless blockchains using temporal graph properties [J]. Applied Network Science, 2021, 6(1): 1-30.
[13] Wu Z, Liu J, Wu J, et al. TRacer: scalable graph-based transaction tracing for account-based blockchain trading systems [J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 2609-2621.
[14] US Department of the Treasury. U.S. treasury sanctions notorious virtual currency mixer tornado cash [EB/OL]. 2022[2024-01-10]. https://home.treasury.gov/news/press-releases/jy0916.
[15] Möser M, Böhme R, Breuker D. Towards risk scoring of bitcoin transactions [C]//Finacial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, 2014, 8438: 16-32.
[16] Andersen R, Chung F, Lang K. Local graph partitioning using PageRank vectors [C]//47th Annual IEEE Symposium on Foundations of Computer Science, 2006: 475-486.
Outlines

/