Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models
Abstract
:1. Introduction
- Section 2 explains the underlying technology of blockchain; provides background information, mainly on different types of cryptocurrency scams; and lists examples from the past.
- Section 3 talks about related surveys and existing detection techniques, which were referred to perform analysis.
- Section 4 covers all of the analysis performed to compare models, the datasets used, and the features extracted from detection models that aimed to address different types of scams.
- Section 5 lists the observations from the analysis of our survey and identifies the best performing models under various conditions.
- Section 6 concludes the survey with all of the understanding and the contributions this survey produces for further research.
2. Background
- Signing: When a user sends money (cryptocurrency) from his wallet, a message is created with the sender’s address, the receiver’s address, and the amount of money. The wallet adds a digital signature that is unique and depends upon the public and private keys of the user. A block is created after the reception and collection of multiple messages.
- Broadcasting: This block is then broadcast to every node for validation.
- Confirmation: The nodes validate the transaction; the block is added to the chain and the entire network is updated with the status.
- Firstly, Bitcoins or any cryptocurrencies are not controlled by a central authority such as governments or banks.
- The original identity of any cryptocurrency user can be hidden behind addresses, whereas the users are always accountable in traditional currencies.
- There is a limited number of coins, which are generally declared by the creator, instead of in traditional cash where the central authority can decide to produce more and more.
- Cryptocurrency is open-source, by which the source code of the coin or the logic is available publicly, which is not available in most traditional systems.
- Finally, cryptocurrency itself has no value, and its value decreases or increases based on usage. However, the value of a traditional currency is always endorsed by fiat.
- Smart contract: The introduction of smart contracts in Ethereum is one major reason for the increase in new projects and investment opportunities using cryptocurrencies. A smart contract is a program that consists of an agreement between two or more parties on a blockchain, which is immutable. These smart contracts do not require a third-party middleman, which reduces additional expenses. They work like an intelligent agent and even automate the process of transferring money to accounts based on pre-defined conditions. These contracts generally have two attributes—value and state—and they mostly use if–then statements as triggering conditions [13]. These contracts are deployed to blockchain renders transactions traceable, transparent, and irreversible.
- Initial Coin Offering (ICO): The ICO provides a way for companies to raise money to launch a new coin, app, or service. Interested investors can purchase a cryptocurrency token issued by a company through an initial coin offering. Depending on the product or service the company is offering, the token may have some utility or represent a stake in the firm. Initial coin offerings are a popular way to raise funds for products and services usually related to cryptocurrency [14].
- Whitepaper: While introducing a new coin or project, the creators release documents called a whitepaper. This whitepaper is a collection of technical, legal, and marketing information [15]. It serves as a road map for the investors while trying to understand the working and goals of a project.
- Mining: The process of producing units of cryptocurrency through some kind of effort is called mining. The effort is required because it ensures that people cannot create an infinite number of cryptocurrencies, which would reduce their value [6]. Mining also includes other processes such as validating cryptocurrency transactions on blockchain networks and adding them to the distributed ledger. Mining usually involves using computer hardware to solve a hash with trillions of possible combinations. Miners who work on this charge transaction fees as a reward for confirming transactions.
- Proof-of-Work: Proof-of-Work is a term that accounts for the work done by miners to confirm transactions in the network. Adding a block to the blockchain requires the hashing of a block, as well as time and computing power. The effort taken for this process, and efforts taken to solve hashes to create new coins, is referred to as proof-of-work.
- Double Spending: In traditional cryptocurrencies, when a user spends a particular amount for a service, they cannot spend the same cash for a different service. When it comes to cryptocurrency, the same coin can be copied multiple times and used for different purposes. This serious issue is known as double spending. The first whitepaper proposing Bitcoin [1] solved this issue using a consensus mechanism of confirming transactions by multiple nodes in a network.
- Gas: As mentioned above, miners charge transaction fees for confirming transactions. In Ethereum, this fee is referred to as gas [16]. It is important to always check for enough gas before committing a transaction because transactions can be regarded as invalid if the user does not have enough gas left in the account.
- Wallets: A wallet is a storage location or device for securing cryptocurrencies securely. Wallets are of two types: hot wallets and cold wallets. Hot wallets are online locations generally offered by crypto exchange platforms or third parties with a private key, and cold wallets are physical storage such as flash drive or a hard drive to store crypto assets [16].
- Bubble: A bubble is an economic cycle that is characterized by the rapid escalation of market value, particularly in the price of assets. This fast inflation is followed by a quick decrease in value or a contraction, which is sometimes referred to as a “crash” or a “bubble burst”. Bubbles are generally a characteristic of a scam that is trying to defraud wealthy investors.
- Exchange: An exchange is a service that individuals and companies can use to trade one cryptocurrency for other cryptocurrencies or fiat to a cryptocurrency.
- Mixers: As we already know, the anonymity of a user is one of the highly preferred features of cryptocurrency, and mixers are used to further strengthen it. Cryptocurrency is deposited into a smart contract designed to execute a mixing transaction from a single address. Users can withdraw previously deposited tokens from another address after a predetermined period of time. Mixers have their own protocol for performing the mixing action, which makes it difficult to track the coins when they are put into a mixer. This is exploited by scammers to escape with the coins that they managed to scam from investors.
- Ponzi schemes: A Ponzi scheme is a fraudulent investment scheme in which an operator pays returns on investments from capital derived from new investors rather than from legitimate investment profits. Ponzi schemes generally fall apart when there is not enough new capital to pay the ever-growing pool of existing investors. Cryptocurrency Ponzi schemes are very common and have resulted in huge losses. OneCoin, BitClub CoinUp, MMM Bitcoin, and PlusToken are popular Ponzi schemes that defrauded investors out of billions of dollars worth of cryptocurrency [17].
- Pump and dump schemes: Pump-and-dump schemes involve accumulating commodities over time, inflating their prices by spreading misinformation (pumping), then selling them at higher prices to unsuspecting buyers (dumping). Due to artificial inflation, the price usually drops, leaving buyers who bought based on false information at a loss. In 2018, pump and dump schemes accumulated about $825 millions from naive investors [7].
- Initial Coin Offering (ICO) Scams: As already mentioned, ICOs can be launched by anyone to raise investment for their project. Scammers take advantage of ICOs to launch coins, mine coins, or create a service. In the end, they cash out the investor’s money and leave the coins they sold with no value. ICO scams can be understood with the help of critically reading the white papers and checking for misleading or copied contents [15].
- High-Yield Investment Programs (HYIP): high-yield investment programs (HYIPs) are Ponzi schemes that promise high returns on investments in short periods of time. These programs have cheated investors out of millions of dollars. On 23 July 2013, the Securities and Exchange Commission (SEC) charged a Bitcoin-based HYIP scammer who offered a 7% daily interest rate to investors and cheated them out of 700,000 BTC, valued at over 1 billion dollars today. [18].
- Money laundering: Money laundering is the illegal process of making “dirty” money appear legitimate instead of ill-gotten. Criminals use a wide variety of money-laundering techniques to make illegally obtained funds appear clean. Online banking and cryptocurrencies have made it easier for criminals to transfer and withdraw money without detection. The prevention of money laundering has become an international effort and now includes terrorist funding among its targets. The financial industry also has its own set of strict anti-money laundering (AML) measures in place [19].
- Crypto hacking: Crypto hacking refers to the hacking of user wallets to spend or steal cryptocurrency from these accounts. The scammers usually use ransomware or phishing techniques to steal the private keys of the users and hack into their accounts [20].
- Market manipulation: Market manipulation is the deliberate attempt to artificially influence or interfere with asset prices. Scammers manipulate the market in multiple ways:
- -
- Spoofing: Creating illusions to cheat investors. Scammers use dummy accounts and bots to place large trades, which are canceled before they are filled, giving other investors the impression that demand is either increasing or decreasing.
- -
- Front running: The practice of making trades based on knowledge of future transactions. Miners and node operators have insights into upcoming trades, which can be used for personal gains.
- -
- Churning: Excessive trading by a broker in a client’s crypto account to generate additional commissions. Asset management firms can receive fees for managing crypto holdings. Therefore, nefarious brokers could abuse a commission-based payment structure to profit off of unaware clients, which could also leave the clients with tax liabilities.
- Giveaway scams: A giveaway scam is very common nowadays. Scammers use social media pages such as YouTube [21] and Twitter to attract investors by saying that a new project or scam is highly functional. They point to websites with fake information and give wallet addresses of scammers asking investors to send money for high returns.
- News articles, blogs, and reports published by trusted resources.
- Official websites such as blockchain.com, coinmarketcap.com, and etherscan.io show real-time transactions and values of cryptocurrencies equivalent to fiat currencies.
3. Related Work
4. Performance Analysis of Detection Models
4.1. Ponzi Schemes
4.2. Money Laundering
4.3. Pump and Dump
4.4. Phishing
4.5. Fake Wallets and Accounts
4.6. Cryptojacking
5. Results and Observation
- Transaction amount: Large transactions or transactions with unusual amounts may indicate a scam.
- Destination address: Scammers often use addresses that are known to be associated with scams, so checking the destination address against a blacklist of known scam addresses can be useful.
- Sender address: The identity of the sender may also provide clues about the nature of the transaction. For example, if the sender’s address is associated with a known scammer, this may indicate a scam.
- Time of transaction: Scammers often act quickly, so transactions that occur over a short period of time are more likely to be scams.
- Contract code: The code associated with the transaction can provide additional information about its purpose. For example, if the contract code is associated with a known scam, this may indicate a scam.
- Network behavior: The behavior of the transaction on the network, such as the number of inputs and outputs, can also provide clues about its nature.
- Previous transactions: The history of the addresses involved in the transaction, including the amount and number of previous transactions, can provide additional information about the nature of the transaction.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 21 December 2022).
- Statista.com. Cryptocurrency Statistics from Statista. Available online: https://www.statista.com/topics/4495/cryptocurrencies/ (accessed on 21 December 2022).
- Coinmarketcap.com. Rankings, Values and Statistics from Coinmarketcap.com. Available online: Coinmarketcap.com (accessed on 21 December 2022).
- Commission, F.T. Data Spotlight, Reports Show Scammers Cashing in on Crypto Craze. 2022. Available online: https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze (accessed on 21 December 2022).
- Adhami, S.; Giudici, G.; Martinazzi, S. Why do businesses go crypto? An empirical analysis of initial coin offerings. J. Econ. Bus. 2018, 100, 64–75. [Google Scholar] [CrossRef]
- United States Sentencing Commission. Bitcoin Glossary: 2018 Annual National Seminar; United States Sentencing Commission: Washington, DC, USA, 2018.
- Iansiti, M.; Lakhani, K.R. The truth about blockchain. Harv. Bus. Rev. 2017, 95, 118–127. [Google Scholar]
- Tharani, J.S.; Charles, E.Y.A.; Hóu, Z.; Palaniswami, M.; Muthukkumarasamy, V. Graph Based Visualisation Techniques for Analysis of Blockchain Transactions. In Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 4–7 October 2021; pp. 427–430. [Google Scholar] [CrossRef]
- Islam, M.N.; Hossen, M.G.S.; Baidya, S.P.; Emon, M.A.U.; Hossain, M.S. A Framework for Tracing the Real Identity of a Bitcoin Scammer. In Proceedings of the 2021 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2), Rajshahi, Bangladesh, 26–27 December 2021; pp. 1–4. [Google Scholar] [CrossRef]
- coindesk.com. How Crypto Could Spearhead Retail Payments in 2022. Available online: https://www.coindesk.com/layer2/paymentsweek/2022/04/29/how-crypto-could-spearhead-retail-payments-in-2022/ (accessed on 21 December 2022).
- Forbes. Top 10 Cryptocurrencies of 2022. Available online: https://www.forbes.com/advisor/investing/cryptocurrency/top-10-cryptocurrencies/ (accessed on 21 December 2022).
- Yuan, Y.; Wang, F.Y. Blockchain and Cryptocurrencies: Model, Techniques, and Applications. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 1421–1428. [Google Scholar] [CrossRef]
- Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F.Y. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
- Investopedia. Initial Coin Offering (ICO): Coin Launch Defined, with Examples. Available online: https://www.investopedia.com/terms/i/initial-coin-offering-ico.asp#:~:text=An-initial-coin-offering-(ICO)-is-the-cryptocurrency-industry’s-equivalent,a-way-to-raise-funds (accessed on 21 December 2022).
- Morin, A.; Vasek, M.; Moore, T. Detecting Text Reuse in Cryptocurrency Whitepapers. In Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 3–6 May 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Forbes. Cryptocurrency Glossary of Terms and Acronyms. Available online: https://www.forbes.com/advisor/investing/cryptocurrency/crypto-glossary/ (accessed on 21 December 2022).
- Mukherjee, S.; Larkin, C. Cryptocurrency Ponzi schemes. In Understanding Cryptocurrency Fraud; Corbet, S., Ed.; De Gruyter: Berlin, Germany; Boston, MA, USA, 2022; pp. 111–120. [Google Scholar] [CrossRef]
- Toyoda, K.; Mathiopoulos, P.T.; Ohtsuki, T. A novel methodology for hyip operators’ Bitcoin addresses identification. IEEE Access 2019, 7, 74835–74848. [Google Scholar] [CrossRef]
- Alarab, I.; Prakoonwit, S.; Nacer, M.I. Competence of graph convolutional networks for anti-money laundering in Bitcoin blockchain. In Proceedings of the 2020 5th International Conference on Machine Learning Technologies, Beijing, China, 19–21 June 2020; pp. 23–27. [Google Scholar]
- Insider, B. 5 Crypto Scams to Know before You Start Trading Coins, Business Insider. Available online: https://www.businessinsider.com/personal-finance/crypto-scams (accessed on 21 December 2022).
- Vakilinia, I. Cryptocurrency Giveaway Scam with YouTube Live Stream. In Proceedings of the 2022 IEEE 13th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 26–29 October 2022; pp. 0195–0200. [Google Scholar]
- The Wall Street Journal. SEC Charges Trade Coin Club Founder, Promoters in $295 Million Bitcoin Fraud. Available online: https://www.wsj.com/articles/sec-charges-trade-coin-club-founder-promoters-in-295-million-Bitcoin-fraud-11667598959?mod=business_minor_pos16 (accessed on 21 December 2022).
- Forbes. How One Man Lost 1 Million Dollar to a Crypto ‘Super Scam’ Called Pig Butchering. Available online: https://www.forbes.com/sites/cyrusfarivar/2022/09/09/pig-butchering-crypto-super-scam/?sh=3930764bec8e (accessed on 21 December 2022).
- The Wall Street Journal. The Crypto Party Is Over. Available online: https://www.wsj.com/articles/the-crypto-party-is-over-11655524807 (accessed on 21 December 2022).
- Times, F. The Lawless World of Crypto Scams. Available online: https://www.ft.com/content/5987649e-9345-4eae-a4b8-9bfb0142a2ab (accessed on 21 December 2022).
- Blockchain. Official Blockchain Website. Available online: www.blockchain.com (accessed on 21 December 2022).
- Etherscan.io. Ethereum Website. Available online: www.etherscan.io (accessed on 21 December 2022).
- Binance. Exchange Platform: Binance. Available online: https://www.binance.com/en (accessed on 21 December 2022).
- Coinbase. Exchange Platform: Coinbase. Available online: https://www.coinbase.com/ (accessed on 21 December 2022).
- Coinmarketcap. Coinmarketcap.com. Available online: https://www.coinmarketcap.com/ (accessed on 21 December 2022).
- Phan, L.; Li, S.; Mentzer, K. Blockchain technology and the current discussion on fraud. Comput. Inf. Syst. J. 2019, 20, 8–20. [Google Scholar]
- Teichmann, F.M.J.; Falker, M.C. Cryptocurrencies and financial crime: Solutions from Liechtenstein. J. Money Laund. Control 2021, 24, 775–788. [Google Scholar] [CrossRef]
- Desmond, D.B.; Lacey, D.; Salmon, P. Evaluating cryptocurrency laundering as a complex socio-technical system: A systematic literature review. J. Money Laund. Control 2019, 22, 480–497. [Google Scholar] [CrossRef]
- Dupuis, D.; Gleason, K. Money laundering with cryptocurrency: Open doors and the regulatory dialectic. J. Financ. Crime 2020, 28, 60–74. [Google Scholar] [CrossRef]
- Jayasinghe, K.; Poravi, G. A survey of attack instances of cryptojacking targeting cloud infrastructure. In Proceedings of the 2020 2nd Asia Pacific Information Technology Conference, Bali Island, Indonesia, 17–19 January 2020; pp. 100–107. [Google Scholar]
- Xia, P.; Wang, H.; Zhang, B.; Ji, R.; Gao, B.; Wu, L.; Luo, X.; Xu, G. Characterizing cryptocurrency exchange scams. Comput. Secur. 2020, 98, 101993. [Google Scholar] [CrossRef]
- Badawi, E.; Jourdan, G.V. Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review. IEEE Access 2020, 8, 200021–200037. [Google Scholar] [CrossRef]
- UmaMaheswaran, S.; Uike, D.; Ramachandran, K.; Tharangini, A.; Suba, T.; Verma, D. The Critical Understanding on the Emerging Threats and Defensive Aspects in Cryptocurrencies using Machine Learning Techniques. In Proceedings of the 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 28–29 April 2022; pp. 1938–1942. [Google Scholar]
- Xia, P.; Wang, H.; Luo, X.; Wu, L.; Zhou, Y.; Bai, G.; Xu, G.; Huang, G.; Liu, X. Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams. In Proceedings of the 2020 APWG Symposium on Electronic Crime Research (eCrime), Boston, MA, USA, 16–19 November 2020; pp. 1–14. [Google Scholar]
- Bartoletti, M.; Carta, S.; Cimoli, T.; Saia, R. Dissecting Ponzi schemes on Ethereum: Identification, analysis, and impact. Future Gener. Comput. Syst. 2020, 102, 259–277. [Google Scholar] [CrossRef]
- Toyoda, K.; Ohtsuki, T.; Mathiopoulos, P.T. Multi-class Bitcoin-enabled service identification based on transaction history summarization. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1153–1160. [Google Scholar]
- Bartoletti, M.; Pes, B.; Serusi, S. Data mining for detecting Bitcoin ponzi schemes. In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20–22 June 2018; pp. 75–84. [Google Scholar]
- Victor, F.; Hagemann, T. Cryptocurrency pump and dump schemes: Quantification and detection. In Proceedings of the 2019 International Conference on Data Mining Workshops (ICDMW), Beijing, China, 8–11 November 2019; pp. 244–251. [Google Scholar]
- Vasek, M.; Thornton, M.; Moore, T. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In Proceedings of the International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 3–7 March 2014; pp. 57–71. [Google Scholar]
- Baek, U.J.; Ji, S.H.; Park, J.T.; Lee, M.S.; Park, J.S.; Kim, M.S. DDoS attack detection on Bitcoin ecosystem using deep-learning. In Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, 18–20 September 2019; pp. 1–4. [Google Scholar]
- Kharraz, A.; Ma, Z.; Murley, P.; Lever, C.; Mason, J.; Miller, A.; Borisov, N.; Antonakakis, M.; Bailey, M. Outguard: Detecting in-browser covert cryptocurrency mining in the wild. In Proceedings of the World Wide Web Conference, San Francisco, CA, USA, 13–17 May 2019; pp. 840–852. [Google Scholar]
- Yin, H.S.; Vatrapu, R. A first estimation of the proportion of cybercriminal entities in the Bitcoin ecosystem using supervised machine learning. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, USA, 11–14 December 2017; pp. 3690–3699. [Google Scholar]
- Chen, W.; Zheng, Z.; Cui, J.; Ngai, E.; Zheng, P.; Zhou, Y. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In Proceedings of the 2018 World Wide Web Conference, Lyon, France, 23–27 April 2018; pp. 1409–1418. [Google Scholar]
- Jung, E.; Le Tilly, M.; Gehani, A.; Ge, Y. Data mining-based ethereum fraud detection. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 266–273. [Google Scholar]
- Chen, W.; Zheng, Z.; Ngai, E.C.H.; Zheng, P.; Zhou, Y. Exploiting blockchain data to detect smart ponzi schemes on ethereum. IEEE Access 2019, 7, 37575–37586. [Google Scholar] [CrossRef]
- Gangwal, A.; Conti, M. Cryptomining cannot change its spots: Detecting covert cryptomining using magnetic side-channel. IEEE Trans. Inf. Forensics Secur. 2019, 15, 1630–1639. [Google Scholar] [CrossRef] [Green Version]
- Ning, R.; Wang, C.; Xin, C.; Li, J.; Zhu, L.; Wu, H. Capjack: Capture in-browser cryptojacking by deep capsule network through behavioral analysis. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 1873–1881. [Google Scholar]
- Zimba, A.; Chishimba, M.; Ngongola-Reinke, C.; Mbale, T.F. Demystifying cryptocurrency mining attacks: A semi-supervised learning approach based on digital forensics and dynamic network characteristics. arXiv 2021, arXiv:2102.10634. [Google Scholar] [CrossRef]
- Alarab, I.; Prakoonwit, S.; Nacer, M.I. Comparative analysis using supervised learning methods for anti-money laundering in Bitcoin. In Proceedings of the 2020 5th International Conference on Machine Learning Technologies, Beijing, China, 19–21 June 2020; pp. 11–17. [Google Scholar]
- Farrugia, S.; Ellul, J.; Azzopardi, G. Detection of illicit accounts over the Ethereum blockchain. Expert Syst. Appl. 2020, 150, 113318. [Google Scholar] [CrossRef] [Green Version]
- Goyal, P.S.; Kakkar, A.; Vinod, G.; Joseph, G. Crypto-ransomware detection using behavioural analysis. In Reliability, Safety and Hazard Assessment for Risk-Based Technologies; Springer: Berlin/Heidelberg, Germany, 2020; pp. 239–251. [Google Scholar]
- Shayegan, M.J.; Sabor, H.R.; Uddin, M.; Chen, C.L. A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network. Symmetry 2022, 14, 328. [Google Scholar] [CrossRef]
- Hu, H.; Bai, Q.; Xu, Y. Scsguard: Deep scam detection for ethereum smart contracts. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual, 2–5 May 2022; pp. 1–6. [Google Scholar]
- La Morgia, M.; Mei, A.; Sassi, F.; Stefa, J. Pump and dumps in the Bitcoin era: Real time detection of cryptocurrency market manipulations. In Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020; pp. 1–9. [Google Scholar]
- Mirtaheri, M.; Abu-El-Haija, S.; Morstatter, F.; Ver Steeg, G.; Galstyan, A. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Trans. Comput. Soc. Syst. 2021, 8, 607–617. [Google Scholar] [CrossRef]
- Chen, W.; Xu, Y.; Zheng, Z.; Zhou, Y.; Yang, J.E.; Bian, J. Detecting Pump & Dump Schemes on cryptocurrency market using an improved Apriori Algorithm. In Proceedings of the 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), San Francisco, CA, USA, 4–9 April 2019; pp. 293–2935. [Google Scholar]
- Yuan, Q.; Huang, B.; Zhang, J.; Wu, J.; Zhang, H.; Zhang, X. Detecting phishing scams on ethereum based on transaction records. In Proceedings of the 2020 IEEE International Symposium on Circuits and Systems (ISCAS), Sevilla, Spain, 10–21 October 2020; pp. 1–5. [Google Scholar]
- Zhang, Y.; Yu, W.; Li, Z.; Raza, S.; Cao, H. Detecting ethereum Ponzi schemes based on improved LightGBM algorithm. IEEE Trans. Comput. Soc. Syst. 2021, 9, 624–637. [Google Scholar] [CrossRef]
- Kumar, N.; Singh, A.; Handa, A.; Shukla, S.K. Detecting malicious accounts on the Ethereum blockchain with supervised learning. In Proceedings of the International Symposium on Cyber Security Cryptography and Machine Learning, Be’er Sheva, Israel, 2–3 July 2020; pp. 94–109. [Google Scholar]
- Fan, S.; Fu, S.; Luo, Y.; Xu, H.; Zhang, X.; Xu, M. Smart Contract Scams Detection with Topological Data Analysis on Account Interaction. In Proceedings of the 31st ACM International Conference on Information & Knowledge Management, Atlanta, GA, USA, 17–21 October 2022; pp. 468–477. [Google Scholar]
- Nizzoli, L.; Tardelli, S.; Avvenuti, M.; Cresci, S.; Tesconi, M.; Ferrara, E. Charting the landscape of online cryptocurrency manipulation. IEEE Access 2020, 8, 113230–113245. [Google Scholar] [CrossRef]
- Phillips, R.; Wilder, H. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2–6 May 2020; pp. 1–8. [Google Scholar]
- Wu, J.; Yuan, Q.; Lin, D.; You, W.; Chen, W.; Chen, C.; Zheng, Z. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Trans. Syst. Man Cybern. Syst. 2020, 52, 1156–1166. [Google Scholar] [CrossRef]
- Lorenz, J.; Silva, M.I.; Aparício, D.; Ascensão, J.T.; Bizarro, P. Machine learning methods to detect money laundering in the Bitcoin blockchain in the presence of label scarcity. In Proceedings of the First ACM International Conference on AI in Finance, New York, NY, USA, 15–16 October 2020; pp. 1–8. [Google Scholar]
- Badawi, A.; Al-Haija, Q.A. Detection of money laundering in Bitcoin transactions. In Proceedings of the 4th Smart Cities Symposium (SCS 2021), Online, 21–23 November 2021; pp. 458–464. [Google Scholar]
- Baek, H.; Oh, J.; Kim, C.Y.; Lee, K. A model for detecting cryptocurrency transactions with discernible purpose. In Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, 2–5 July 2019; pp. 713–717. [Google Scholar]
- Wen, H.; Fang, J.; Wu, J.; Zheng, Z. Transaction-based hidden strategies against general phishing detection framework on ethereum. In Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea, 22–28 May 2021; pp. 1–5. [Google Scholar]
- Chen, W.; Guo, X.; Chen, Z.; Zheng, Z.; Lu, Y. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In Proceedings of the IJCAI, Yokohama, Japan, 11–17 July 2020; pp. 4506–4512. [Google Scholar]
- Ostapowicz, M.; Żbikowski, K. Detecting fraudulent accounts on blockchain: A supervised approach. In Proceedings of the International Conference on Web Information Systems Engineering, Amsterdam, The Netherlands, 20–24 October 2020; pp. 18–31. [Google Scholar]
- Toyoda, K.; Ohtsuki, T.; Mathiopoulos, P.T. Identification of high yielding investment programs in Bitcoin via transactions pattern analysis. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
- CNBC. Crypto Scammers Took a Record $14 Billion in 2021, 6 January 2022. Available online: https://www.cnbc.com/2022/01/06/crypto-scammers-took-a-record-14-billion-in-2021-chainalysis.html (accessed on 21 December 2022).
Category | References |
---|---|
Textbooks, architectures, and processes | [1,6,7,9,12,14] |
Existing surveys, literature reviews, and analysis publications | [5,31,32,33,34,35,36,37,38,39,40] |
Detection techniques on scams in cryptocurrencies using machine learning algorithms | [18,19,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65] |
Other type of approaches to solve scams | [15,66,67,68] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Krishnan, L.P.; Vakilinia, I.; Reddivari, S.; Ahuja, S. Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models. Information 2023, 14, 171. https://doi.org/10.3390/info14030171
Krishnan LP, Vakilinia I, Reddivari S, Ahuja S. Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models. Information. 2023; 14(3):171. https://doi.org/10.3390/info14030171
Chicago/Turabian StyleKrishnan, Lakshmi Priya, Iman Vakilinia, Sandeep Reddivari, and Sanjay Ahuja. 2023. "Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models" Information 14, no. 3: 171. https://doi.org/10.3390/info14030171
APA StyleKrishnan, L. P., Vakilinia, I., Reddivari, S., & Ahuja, S. (2023). Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models. Information, 14(3), 171. https://doi.org/10.3390/info14030171