2022
DOI: 10.15282/ijsecs.8.2.2022.5.0102
|View full text |Cite
|
Sign up to set email alerts
|

Fraudulent Account Detection in the Ethereum’s Network Using Various Machine Learning Techniques

Abstract: On the Ethereum network, users communicate with one another through a variety of different accounts. Pseudo-anonymity was enforced over the network to provide the highest level of privacy. By using accounts that engage in fraudulent activity across the network, such privacy may be exploited. Like other cryptocurrencies, Ethereum blockchain may exploited with several fraudulent activities such as Ponzi schemes, phishing, or Initial Coin Offering (ICO) exits, etc. However, the identificatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…New risks have surfaced in addition to the ease brought about by the quick advancements in information and technology. Attackers have altered their goal, method, and kind of assault due to their fast adaptation to new technology [14], [15]. A new generation of security procedures is required for governmental organizations and institutions, commercial corporations, and ordinary internet users to deal with these risks.…”
Section: Proposed Modelmentioning
confidence: 99%
“…New risks have surfaced in addition to the ease brought about by the quick advancements in information and technology. Attackers have altered their goal, method, and kind of assault due to their fast adaptation to new technology [14], [15]. A new generation of security procedures is required for governmental organizations and institutions, commercial corporations, and ordinary internet users to deal with these risks.…”
Section: Proposed Modelmentioning
confidence: 99%
“…Based on the behavior of accounts in Ethereum transactions, [26] investigates the detection of legitimate and unlawful activity. This work developed detection models using a dataset including 4,681 rows of data and three model types (RF, KNN, and XGB).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Using the XGB model, this investigation achieved an accuracy of 96.3%. Meanwhile, a study by [26,27] also does not use a specific feature selection method and focuses more on manual feature extraction during the data preparation phase for Ethereum account fraud detection.…”
mentioning
confidence: 99%
“…Nonce provides an overview of the quality of transactions between accounts or contracts. At the same time, the Ether Balance reveals the account balance in Wei units, while the hash is a hash code generated by the ethereum virtual machine (EVM), and storage represents the 256-bit hash resulting from the Merkle Root mechanism [19]. The Ethereum network consists of two types of transactions: normal transactions and internal transactions [20].…”
Section: *Author For Correspondencementioning
confidence: 99%