Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency

With the boom of cryptocurrency and its concomitant financial risk concerns, detecting fraudulent behaviors and associated malicious addresses has been drawing significant research effort. Most existing studies, however, rely on the full history features or full-fledged address transaction networks,...

Full description

Saved in:
Bibliographic Details
Main Authors: CHENG, Ling, ZHU, Feida, WANG, Yong, LIANG, Ruicheng, LIU, Huiwen
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2023
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7809
https://ink.library.smu.edu.sg/context/sis_research/article/8812/viewcontent/3580305.3599817_pvoa.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8812
record_format dspace
spelling sg-smu-ink.sis_research-88122024-07-24T00:46:31Z Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency CHENG, Ling ZHU, Feida WANG, Yong LIANG, Ruicheng LIU, Huiwen With the boom of cryptocurrency and its concomitant financial risk concerns, detecting fraudulent behaviors and associated malicious addresses has been drawing significant research effort. Most existing studies, however, rely on the full history features or full-fledged address transaction networks, both of which are unavailable in the problem of early malicious address detection and therefore failing them for the task. To detect fraudulent behaviors of malicious addresses in the early stage, we present Evolve Path Tracer, which consists of Evolve Path Encoder LSTM, Evolve Path Graph GCN, and Hierarchical Survival Predictor. Specifically, in addition to the general address features, we propose Asset Transfer Paths and corresponding path graphs to characterize early transaction patterns. Furthermore, since transaction patterns change rapidly in the early stage, we propose Evolve Path Encoder LSTM and Evolve Path Graph GCN to encode asset transfer path and path graph under an evolving structure setting. Hierarchical Survival Predictor then predicts addresses' labels with high scalability and efficiency. We investigate the effectiveness and generalizability of Evolve Path Tracer on three real-world malicious address datasets. Our experimental results demonstrate that Evolve Path Tracer outperforms the state-of-the-art methods. Extensive scalability experiments demonstrate the model's adaptivity under a dynamic prediction setting. 2023-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7809 info:doi/10.1145/3580305.3599817 https://ink.library.smu.edu.sg/context/sis_research/article/8812/viewcontent/3580305.3599817_pvoa.pdf http://creativecommons.org/licenses/by/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University evolve encoder asset transfer path early malice detection cryptocurrency Databases and Information Systems Finance and Financial Management Numerical Analysis and Scientific Computing
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic evolve encoder
asset transfer path
early malice detection
cryptocurrency
Databases and Information Systems
Finance and Financial Management
Numerical Analysis and Scientific Computing
spellingShingle evolve encoder
asset transfer path
early malice detection
cryptocurrency
Databases and Information Systems
Finance and Financial Management
Numerical Analysis and Scientific Computing
CHENG, Ling
ZHU, Feida
WANG, Yong
LIANG, Ruicheng
LIU, Huiwen
Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
description With the boom of cryptocurrency and its concomitant financial risk concerns, detecting fraudulent behaviors and associated malicious addresses has been drawing significant research effort. Most existing studies, however, rely on the full history features or full-fledged address transaction networks, both of which are unavailable in the problem of early malicious address detection and therefore failing them for the task. To detect fraudulent behaviors of malicious addresses in the early stage, we present Evolve Path Tracer, which consists of Evolve Path Encoder LSTM, Evolve Path Graph GCN, and Hierarchical Survival Predictor. Specifically, in addition to the general address features, we propose Asset Transfer Paths and corresponding path graphs to characterize early transaction patterns. Furthermore, since transaction patterns change rapidly in the early stage, we propose Evolve Path Encoder LSTM and Evolve Path Graph GCN to encode asset transfer path and path graph under an evolving structure setting. Hierarchical Survival Predictor then predicts addresses' labels with high scalability and efficiency. We investigate the effectiveness and generalizability of Evolve Path Tracer on three real-world malicious address datasets. Our experimental results demonstrate that Evolve Path Tracer outperforms the state-of-the-art methods. Extensive scalability experiments demonstrate the model's adaptivity under a dynamic prediction setting.
format text
author CHENG, Ling
ZHU, Feida
WANG, Yong
LIANG, Ruicheng
LIU, Huiwen
author_facet CHENG, Ling
ZHU, Feida
WANG, Yong
LIANG, Ruicheng
LIU, Huiwen
author_sort CHENG, Ling
title Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
title_short Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
title_full Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
title_fullStr Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
title_full_unstemmed Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency
title_sort evolve path tracer: early detection of malicious addresses in cryptocurrency
publisher Institutional Knowledge at Singapore Management University
publishDate 2023
url https://ink.library.smu.edu.sg/sis_research/7809
https://ink.library.smu.edu.sg/context/sis_research/article/8812/viewcontent/3580305.3599817_pvoa.pdf
_version_ 1814047696321773568