Journal on Communications ›› 2022, Vol. 43 ›› Issue (1): 194-202.doi: 10.11959/j.issn.1000-436x.2022011
Special Issue: 区块链
• Papers • Previous Articles Next Articles
Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG
Revised:
2022-01-05
Online:
2022-01-25
Published:
2022-01-01
Supported by:
CLC Number:
Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG. Honeypot contract detection of blockchain based on deep learning[J]. Journal on Communications, 2022, 43(1): 194-202.
"
类别 | KOLSTM | LightGBM | |||||
精确率 | 召回率 | F值 | 精确率 | 召回率 | F值 | ||
US | 88.17% | 91.98% | 90.03% | 100% | 90.55% | 95.04% | |
BD | 92.42% | 89.17% | 91.04% | 100% | 100% | 100% | |
HSU | 88.71% | 82.09% | 85.27% | 100% | 92.57% | 96.14% | |
HT | 91.91% | 100% | 95.79% | 100% | 91.07% | 95.33% | |
ID | 73.68% | 80.77% | 77.06% | 100% | 82.39% | 90.34% | |
SESL | 94.00% | 100% | 96.91% | 0 | 88.89% | 0 | |
SMC | 87.00% | 98.86% | 92.55% | 97.73% | 92.21% | 94.89% | |
TDO | 98.86% | 100% | 99.43% | 0 | 0 | 0 | |
平均值 | 89.34% | 92.86% | 91.01% | 74.71% | 79.71% | 71.47% |
[1] | ZHENG Z B , XIE S A , DAI H N ,et al. An overview of blockchain technology:architecture,consensus,and future trends[C]// Proceedings of 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway:IEEE Press, 2017: 557-564. |
[2] | ZHENG Z B , XIE S A , DAI H N ,et al. An overview on smart contracts:challenges,advances and platforms[J]. Future Generation Computer Systems, 2020,105: 475-491. |
[3] | TORRES C F , STEICHEN M . The art of the scam:demystifying honeypots in Ethereum smart contracts[C]// Proceedings of 28th USENIX Security Symposium (USENIX Security 19). Berkeley:USENIX Association, 2019: 1591-1607. |
[4] | CAMINO R , TORRES C F , BADEN M ,et al. A data science approach for detecting honeypots in Ethereum[C]// Proceedings of 2020 IEEE International Conference on Blockchain and Cryptocurrency. Piscata-way:IEEE Press, 2020: 1-9. |
[5] | CHEN W L , GUO X F , CHEN Z G ,et al. Honeypot contract risk warning on Ethereum smart contracts[C]// Proceedings of 2020 IEEE International Conference on Joint Cloud Computing. Piscataway:IEEE Press, 2020: 1-8. |
[6] | 曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151. |
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151. | |
[7] | CONTI M , SANDEEP KUMAR E , LAL C ,et al. A survey on security and privacy issues of bitcoin[J]. IEEE Communications Surveys &Tutorials, 2018,20(4): 3416-3452. |
[8] | VASEK M , MOORE T . There’s no free lunch,even using bitcoin:tracking the popularity and profits of virtual currency scams[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2015: 44-61. |
[9] | BARTOLETTI M , CARTA S , CIMOLI T ,et al. Dissecting Ponzi schemes on Ethereum:identification,analysis,and impact[J]. Future Generation Computer Systems, 2020,102: 259-277. |
[10] | CHEN W L , ZHENG Z B , NGAI E C H ,et al. Exploiting blockchain data to detect smart ponzi schemes on Ethereum[J]. IEEE Access, 2019,7: 37575-37586. |
[11] | CHEN W L , ZHENG Z B , CUI J H ,et al. Detecting ponzi schemes on Ethereum:towards healthier blockchain technology[C]// Proceedings of the 2018 World Wide Web Conference on World Wide Web. New York:ACM Press, 2018: 409-1418. |
[12] | 张艳梅, 楼胤成 . 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021,48(1): 273-279. |
ZHANG Y M , LOU Y C . Deep neural network based ponzi scheme contract detection method[J]. Computer Science, 2021,48(1): 273-279. | |
[13] | CHEN T Q , GUESTRIN C . XGBoost:a scalable tree boosting system[C]// Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2016: 785-794. |
[14] | TIKHOMIROV S , VOSKRESENSKAYA E , IVANITSKIY I ,et al. SmartCheck:static analysis of Ethereum smart contracts[C]// Proceedings of 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB). Piscataway:IEEE Press, 2018: 9-16. |
[15] | LIU C , LIU H , CAO Z ,et al. ReGuard:finding reentrancy bugs in smart contracts[C]// Proceedings of 2018 IEEE/ACM 40th International Conference on Software Engineering:Companion (ICSE-Companion). Piscataway:IEEE Press, 2018: 65-68. |
[16] | JIANG B , LIU Y , CHAN W K . ContractFuzzer:fuzzing smart contracts for vulnerability detection[C]// Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. New York:ACM Press, 2018: 259-269. |
[17] | ZHANG Y , JIN R , ZHOU Z H . Understanding bag-of-words model:a statistical framework[J]. International Journal of Machine Learning and Cybernetics, 2010,1(1/2/3/4): 43-52. |
[18] | KE G , MENG Q , FINLEY T ,et al. LightGBM:a highly efficient gradient boosting decision tree[J]. Advances in Neural Information Processing Systems, 2017,30: 3146-3154. |
[19] | LIU H , YANG Z Q , LIU C ,et al. EClone:detect semantic clones in Ethereum via symbolic transaction sketch[C]// Proceedings of ESEC/FSE 2018:Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York:ACM Press, 2018: 900-903. |
[20] | 施聪莺, 徐朝军, 杨晓江 . TFIDF 算法研究综述[J]. 计算机应用, 2009,29(S1): 167-170,180. |
SHI C Y , XU C J , YANG X J . Study of TFIDF algorithm[J]. Journal of Computer Applications, 2009,29(S1): 167-170,180. | |
[21] | MIKOLOV T , CHEN K , CORRADO G ,et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint,arXiv:1301.3781, 2013. |
[22] | WEI J , ZOU K . EDA:easy data augmentation techniques for boosting performance on text classification tasks[C]// Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Boston:Association for Computational Linguistics, 2019: 6382-6388. |
[23] | ARLOT S , CELISSE A . A survey of cross-validation procedures for model selection[J]. Statistics Surveys, 2010,4: 40-79. |
[24] | GAL Y , GHAHRAMANI Z . A theoretically grounded application of dropout in recurrent neural networks[J]. arXiv Preprint,arXiv:1512.05287, 2015. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[4] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[5] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[6] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[7] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[8] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[9] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[10] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[11] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[12] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[13] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[14] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[15] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|