Study on type analysis and identification of Ethereum Ponzi scheme
CSTR:
Author:
Clc Number:

TP391.1

  • Article
  • | |
  • Metrics
  • |
  • Reference [20]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    As the number of investors in the blockchain investment field increases, the impact of Ponzi schemes hidden in smart contracts becomes worse. Although some researchers have begun to pay attention to the Ponzi scheme in the blockchain, most of them remain at the level of detection. This paper will conduct further research on the basis of the existing Ethereum Ponzi scheme detection method, and propose a novel Ethereum Ponzi scheme type identification method. The method is based on the source code and transaction record of the smart contract. By analyzing the extracted keywords, we match the keywords with the source code of the contract to be tested, then combine the logic of the transaction record, and performe a secondary analysis to determine which type of scam the contract belongs to. Experiments on the real dataset of Ethereum show that the classification accuracy of the method can reach 80% compared with the results of manual classification. This study will help researchers and investors better understand the nature of ethereum smart contract ponzi scheme.

    Reference
    [1] Buterin V. A next-generation smart contract and decentralized application platform[J]. Etherum, 2014:1-36.
    [2] Wood G. Ethereum:a secure decentralised generalised transaction[J]. Ethereum Project Yellow Paper, 2014:1-32.
    [3] Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of Things[J]. IEEE Access, 2016, 4:2292-2303.
    [4] Juels A, Kosba A, Shi E. The Ring of Gyges:investigating the future of criminal smart contracts[C]//CCS'16:Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, USA:ACM, 2016:283-295.
    [5] Norta A. Creation of smart-contracting collaborations for decentralized autonomous organizations[M]. Cham:Springer International Publishing, 2015:3-17.
    [6] Artzrouni M. The mathematics of ponzi schemes[J]. Mathematical Social Sciences, 2009, 58(2):190-201.
    [7] Bartoletti M, Carta S, Cimoli T, et al. Dissecting ponzi schemes on ethereum:identification, analysis, and impact[J/OL]. P2P Financial Systems International Workshop (P2PFISY 2017), 2019[2020-09-29]. https://arxiv.org/abs/1703.03779.
    [8] Higgins S. SEC seizes assets from alleged altcoin pyra-mid scheme[EB/OL]. https://www.coindesk.com/sec-seizesalleged-altcoin-pyramid-scheme.
    [9] Keirns G. ‘Gemcoin’ ponzi scheme operator hit with $74 million judgment[EB/OL]. https://bitcoinwiki.co/gemcoinponzi-scheme-operator-hit-with-74-million-judgment/.
    [10] Morris D Z. The rise of cryptocurrency ponzischemes[EB/OL].https://www.theatlantic.com/technology/archive/2017/05/cryptocurrency-ponzi-schemes/528624/.
    [11] Bonneau J, Miller A, Clark J, et al. SoK:research perspectives and challenges for bitcoin and cryptocurrencies[C]//2015 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2015:104-121.
    [12] Vasek M, Moore T. There's no free lunch, even using bitcoin:Tracking the popularity and profits of virtual currency scams[C]//Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Berlin, Germany:Springer, 2015, 8975:44-61.
    [13] Elwell C K, Murphy M M, Seitzinger M V. Bitcoin:questions, answers, and analysis of legal issues[J/OL]. Virtual Currencies:Regulatory and Tax Compliance Issues,2014[2020-09-29]. https://fas.org/sgp/crs/misc/R43339.pdf.
    [14] Vasek M, Moore T. Analyzing the bitcoin ponzi scheme ecosystem[J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 10958:101-112.
    [15] Bartoletti M, Carta S, Cimoli T, et al. Dissecting Ponzi schemes on Ethereum:Identification, analysis, and impact[J]. Future Generation Computer Systems, 2020, 102:259-277.
    [16] Chen W, Zheng Z, Cui J, et al. Detecting ponzi schemes on ethereum:towards healthier blockchain technology[C]//WWW'18:Proceedings of the 2018 World Wide Web Conference. New York, USA:ACM Press, 2018:1409-1418.
    [17] Bartoletti M, Pes B, Serusi S. Data mining for detecting bitcoin ponzi schemes[C]//2018 Crypto Valley Conference on Blockchain Technology (CVCBT). Piscataway, NJ:IEEE, 2018:75-84.
    [18] Brenig C, Accorsi R, Möller G. Economic analysis of cryptocurrency backed money laundering[J/OL]. 23rd European Conference on Information Systems, 2015[2020-09-29]. http://aisel.aisnet.org/ecis2015_cr/20
    [19] Moser M, Bohme R, Breuker D. An inquiry into money laundering tools in the Bitcoin ecosystem[C]//2013 APWG eCrime Researchers Summit. Piscataway, NJ:IEEE, 2013:1-14.
    [20] Li Y J, Liu B. A normalized levenshtein distance metric[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(6):1091-1095.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

喻文强,张艳梅,李梓宇,牛娃.以太坊庞氏骗局的类型分析与识别方法[J].重庆大学学报,2020,43(11):111~120

Copy
Share
Article Metrics
  • Abstract:1580
  • PDF: 1940
  • HTML: 2333
  • Cited by: 0
History
  • Received:July 19,2020
  • Online: December 02,2020
  • Published: November 30,2020
Article QR Code