TY - GEN
T1 - TGC
T2 - 39th Annual Computer Security Applications Conference, ACSAC 2023
AU - Li, Sijia
AU - Gou, Gaopeng
AU - Liu, Chang
AU - Xiong, Gang
AU - Li, Zhen
AU - Xiao, Junchao
AU - Xing, Xinyu
N1 - Publisher Copyright:
© 2023 Owner/Author.
PY - 2023/12/4
Y1 - 2023/12/4
N2 - Phishing scams have become the most serious type of crime involved in Ethereum. However, existing methods ignore the natural camouflage and sparse distribution of phishing scams in Ethereum leading to unsatisfactory performance, and they are also limited by the data scale which cannot be applied to real-world dynamic scenarios. In this paper, we propose a Transaction Graph Contrast network (TGC) to enhance phishing scam detection performance on Ethereum. TGC inputs subgraphs instead of the entire graph for training, which eases the model's requirements for machine configuration and data connectivity. Motivated by phishing nodes are surrounded by normal nodes, we design the comparison between node-level to help phishing nodes learn the unique properties of themselves different from their neighbors. Observing the small number and sparse distribution of phishing nodes, we narrow the distance between phishing nodes by comparing node context-level structures, so as to learn universal transaction patterns. We further combine the obtained features with common statistics to identify phishing addresses. Evaluated on real-world Ethereum phishing scams datasets, our TGC outperforms the state-of-the-art methods in detecting phishing addresses and has obvious advantages in large-scale and dynamic scenarios.
AB - Phishing scams have become the most serious type of crime involved in Ethereum. However, existing methods ignore the natural camouflage and sparse distribution of phishing scams in Ethereum leading to unsatisfactory performance, and they are also limited by the data scale which cannot be applied to real-world dynamic scenarios. In this paper, we propose a Transaction Graph Contrast network (TGC) to enhance phishing scam detection performance on Ethereum. TGC inputs subgraphs instead of the entire graph for training, which eases the model's requirements for machine configuration and data connectivity. Motivated by phishing nodes are surrounded by normal nodes, we design the comparison between node-level to help phishing nodes learn the unique properties of themselves different from their neighbors. Observing the small number and sparse distribution of phishing nodes, we narrow the distance between phishing nodes by comparing node context-level structures, so as to learn universal transaction patterns. We further combine the obtained features with common statistics to identify phishing addresses. Evaluated on real-world Ethereum phishing scams datasets, our TGC outperforms the state-of-the-art methods in detecting phishing addresses and has obvious advantages in large-scale and dynamic scenarios.
UR - http://www.scopus.com/inward/record.url?scp=85180150476&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85180150476&partnerID=8YFLogxK
U2 - 10.1145/3627106.3627109
DO - 10.1145/3627106.3627109
M3 - Conference contribution
AN - SCOPUS:85180150476
T3 - ACM International Conference Proceeding Series
SP - 352
EP - 365
BT - Proceedings - 39th Annual Computer Security Applications Conference, ACSAC 2023
PB - Association for Computing Machinery
Y2 - 4 December 2023 through 8 December 2023
ER -