Although Ethereum has shown impressive innovation in blockchain technology, its open and anonymous nature also provides opportunities for malicious actors. The data is clear: by the first half of last year, the total losses from ICO fraud and online scams reached $225 million, and the amounts involved in those abnormal transactions throughout 2022 are even more staggering—$23.8 billion.
How to fill such a huge black hole? Traditional manual annotation methods are no longer sufficient; data labeling is limited, costly, and difficult to scale. Fortunately, breakthroughs in unsupervised machine learning technology in recent years have brought new ideas to transaction risk detection.
**Where to start? First, organize the data** The first step in abnormal transaction detection is to structure the massive transaction data of Ethereum. Pull historical transaction records from on-chain data sources, then construct a weighted multi-transaction network. Simply put, the nodes in the graph represent accounts, edges represent transaction flows, and weights are determined by transaction amounts and timestamps. The advantage of this design is that it can reveal both the relationships between accounts and the spatiotemporal features of transactions. For example, high-frequency large transactions may indicate a Ponzi scheme, while dispersed small transactions could involve dust attacks.
**Then, use dual graph transformation to extract deep features** In the original transaction network, transaction relationships are often obscure. Researchers came up with the idea of dual graph transformation: treat each transaction itself as an independent node and establish connections between transactions sharing accounts. With this transformation, the indirect relationships between transactions become explicit, allowing the discovery of many previously unseen chains of relationships.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
12 Likes
Reward
12
4
Repost
Share
Comment
0/400
AirDropMissed
· 14h ago
$23.8 billion black hole, this scale is truly incredible... but it seems AI detection also can't guarantee 100% foolproof.
View OriginalReply0
CryptoFortuneTeller
· 14h ago
$23.8 billion? With this number, DeFi is really a black hole... Luckily, machine learning is here to put out the fire.
View OriginalReply0
MissedAirdropAgain
· 14h ago
23.8 billion USD... Oh my god, this number is mind-blowing.
View OriginalReply0
ImpermanentPhobia
· 14h ago
23.8 billion, huh? This black hole is really deep, a bit outrageous... Can machine learning really catch these scammers? I feel like some still slip through the cracks.
Although Ethereum has shown impressive innovation in blockchain technology, its open and anonymous nature also provides opportunities for malicious actors. The data is clear: by the first half of last year, the total losses from ICO fraud and online scams reached $225 million, and the amounts involved in those abnormal transactions throughout 2022 are even more staggering—$23.8 billion.
How to fill such a huge black hole? Traditional manual annotation methods are no longer sufficient; data labeling is limited, costly, and difficult to scale. Fortunately, breakthroughs in unsupervised machine learning technology in recent years have brought new ideas to transaction risk detection.
**Where to start? First, organize the data**
The first step in abnormal transaction detection is to structure the massive transaction data of Ethereum. Pull historical transaction records from on-chain data sources, then construct a weighted multi-transaction network. Simply put, the nodes in the graph represent accounts, edges represent transaction flows, and weights are determined by transaction amounts and timestamps. The advantage of this design is that it can reveal both the relationships between accounts and the spatiotemporal features of transactions. For example, high-frequency large transactions may indicate a Ponzi scheme, while dispersed small transactions could involve dust attacks.
**Then, use dual graph transformation to extract deep features**
In the original transaction network, transaction relationships are often obscure. Researchers came up with the idea of dual graph transformation: treat each transaction itself as an independent node and establish connections between transactions sharing accounts. With this transformation, the indirect relationships between transactions become explicit, allowing the discovery of many previously unseen chains of relationships.