Log In Sign Up

Dual-channel Early Warning Framework for Ethereum Ponzi Schemes

by   Jie Jin, et al.

Blockchain technology supports the generation and record of transactions, and maintains the fairness and openness of the cryptocurrency system. However, many fraudsters utilize smart contracts to create fraudulent Ponzi schemes for profiting on Ethereum, which seriously affects financial security. Most existing Ponzi scheme detection techniques suffer from two major restricted problems: the lack of motivation for temporal early warning and failure to fuse multi-source information finally cause the lagging and unsatisfactory performance of Ethereum Ponzi scheme detection. In this paper, we propose a dual-channel early warning framework for Ethereum Ponzi schemes, named Ponzi-Warning, which performs feature extraction and fusion on both code and transaction levels. Moreover, we represent a temporal evolution augmentation strategy for generating transaction graph sequences, which can effectively increase the data scale and introduce temporal information. Comprehensive experiments on our Ponzi scheme datasets demonstrate the effectiveness and timeliness of our framework for detecting the Ponzi contract accounts.


page 1

page 2

page 3

page 4


Ponzi Scheme Detection in EthereumTransaction Network

With the rapid growth of blockchain, an increasing number of users have ...

Evolution of Ethereum: A Temporal Graph Perspective

Ethereum is one of the most popular blockchain systems that supports mor...

Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking

With the wide application of blockchain in the financial field, the rise...

Data-driven Smart Ponzi Scheme Detection

A smart Ponzi scheme is a new form of economic crime that uses Ethereum ...

Heterogeneous Feature Augmentation for Ponzi Detection in Ethereum

While blockchain technology triggers new industrial and technological re...

Sharpening Ponzi Schemes Detection on Ethereum with Machine Learning

Blockchain technology has been successfully exploited for deploying new ...