Fishing for Phishers: Learning-Based Phishing Detection in Ethereum Transactions
- URL: http://arxiv.org/abs/2504.17953v1
- Date: Thu, 24 Apr 2025 21:41:00 GMT
- Title: Fishing for Phishers: Learning-Based Phishing Detection in Ethereum Transactions
- Authors: Ahod Alghuried, Abdulaziz Alghamdi, Ali Alkinoon, Soohyeon Choi, Manar Mohaisen, David Mohaisen,
- Abstract summary: We show how different feature sets impact the performance of phishing detection models.<n>We also address key challenges such as class imbalance and dataset composition.<n>Our findings provide a clearer understanding of how feature affect model resilience and generalization in adversarial environments.
- Score: 9.362363409064546
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Phishing detection on Ethereum has increasingly leveraged advanced machine learning techniques to identify fraudulent transactions. However, limited attention has been given to understanding the effectiveness of feature selection strategies and the role of graph-based models in enhancing detection accuracy. In this paper, we systematically examine these issues by analyzing and contrasting explicit transactional features and implicit graph-based features, both experimentally and analytically. We explore how different feature sets impact the performance of phishing detection models, particularly in the context of Ethereum's transactional network. Additionally, we address key challenges such as class imbalance and dataset composition and their influence on the robustness and precision of detection methods. Our findings demonstrate the advantages and limitations of each feature type, while also providing a clearer understanding of how feature affect model resilience and generalization in adversarial environments.
Related papers
- Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations [9.362363409064546]
This paper explores the vulnerability of machine learning models to simple single-feature adversarial attacks in the context of fraudulent transaction detection.<n>Through comprehensive experimentation, we investigate the impact of various adversarial attack strategies on model performance metrics.<n>We examine the effectiveness of different mitigation strategies, including adversarial training and enhanced feature selection, in enhancing model robustness and show their effectiveness.
arXiv Detail & Related papers (2025-04-24T15:54:56Z) - Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis [12.607077453567594]
We investigate the impact of various adversarial attack strategies on model performance metrics, such as accuracy, precision, recall, and F1-score.
We examine the effectiveness of different mitigation strategies, including adversarial training and enhanced feature selection, in enhancing model robustness.
arXiv Detail & Related papers (2024-08-06T20:40:20Z) - Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection [3.877894934465948]
Bitcoin has become one of the primary global platforms for cryptocurrency, playing an important role in promoting the diversification of the financial ecosystem.
Previous regulatory methods usually detect malicious accounts through feature engineering or large-scale transaction graph mining.
We propose an Transaction Graph Compression method named TGC4Eth, which assists malicious detection by lightweighting both features and topology of the transaction graph.
arXiv Detail & Related papers (2024-05-14T02:21:20Z) - On the Potential of Network-Based Features for Fraud Detection [3.0846824529023382]
This article explores using the personalised PageRank (PPR) algorithm to capture the social dynamics of fraud.
The primary objective is to compare the performance of traditional features with the addition of PPR in fraud detection models.
Results indicate that integrating PPR enhances the model's predictive power, surpassing the baseline model.
arXiv Detail & Related papers (2024-02-14T13:20:09Z) - Understanding Robust Overfitting from the Feature Generalization Perspective [61.770805867606796]
Adversarial training (AT) constructs robust neural networks by incorporating adversarial perturbations into natural data.
It is plagued by the issue of robust overfitting (RO), which severely damages the model's robustness.
In this paper, we investigate RO from a novel feature generalization perspective.
arXiv Detail & Related papers (2023-10-01T07:57:03Z) - Investigating Human-Identifiable Features Hidden in Adversarial
Perturbations [54.39726653562144]
Our study explores up to five attack algorithms across three datasets.
We identify human-identifiable features in adversarial perturbations.
Using pixel-level annotations, we extract such features and demonstrate their ability to compromise target models.
arXiv Detail & Related papers (2023-09-28T22:31:29Z) - Improving robustness of jet tagging algorithms with adversarial training [56.79800815519762]
We investigate the vulnerability of flavor tagging algorithms via application of adversarial attacks.
We present an adversarial training strategy that mitigates the impact of such simulated attacks.
arXiv Detail & Related papers (2022-03-25T19:57:19Z) - Information-Theoretic Odometry Learning [83.36195426897768]
We propose a unified information theoretic framework for learning-motivated methods aimed at odometry estimation.
The proposed framework provides an elegant tool for performance evaluation and understanding in information-theoretic language.
arXiv Detail & Related papers (2022-03-11T02:37:35Z) - Towards Unbiased Visual Emotion Recognition via Causal Intervention [63.74095927462]
We propose a novel Emotion Recognition Network (IERN) to alleviate the negative effects brought by the dataset bias.
A series of designed tests validate the effectiveness of IERN, and experiments on three emotion benchmarks demonstrate that IERN outperforms other state-of-the-art approaches.
arXiv Detail & Related papers (2021-07-26T10:40:59Z) - Understanding Failures of Deep Networks via Robust Feature Extraction [44.204907883776045]
We introduce and study a method aimed at characterizing and explaining failures by identifying visual attributes whose presence or absence results in poor performance.
We leverage the representation of a separate robust model to extract interpretable features and then harness these features to identify failure modes.
arXiv Detail & Related papers (2020-12-03T08:33:29Z) - Information Obfuscation of Graph Neural Networks [96.8421624921384]
We study the problem of protecting sensitive attributes by information obfuscation when learning with graph structured data.
We propose a framework to locally filter out pre-determined sensitive attributes via adversarial training with the total variation and the Wasserstein distance.
arXiv Detail & Related papers (2020-09-28T17:55:04Z) - Influence Functions in Deep Learning Are Fragile [52.31375893260445]
influence functions approximate the effect of samples in test-time predictions.
influence estimates are fairly accurate for shallow networks.
Hessian regularization is important to get highquality influence estimates.
arXiv Detail & Related papers (2020-06-25T18:25:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.