Skip to main content
Log in

Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

Blockchain is gradually becoming an important data storage platform for Internet digital copyright confirmation, electronic deposit, and data sharing. Anomaly detection on the blockchain has received extensive attention as the foundation for securing blockchain-based digital applications. However, the current blockchain anomaly detection for obtaining network nodes’ depth and dynamic change features still needs improvement. In this paper, we propose a public blockchain anomaly detection method based on evolved graph attention. Different from general blockchain network modeling methods, we first adopt a dynamic attribute graph network construction method to model each transaction using edges to provide more learnable transaction attribute information for graph representation learning in blockchain networks. Then, we propose an evoluted graph attention network structure to fully extract the deep features of blockchain nodes by learning the temporal evolution characteristics of blockchain networks and dynamically updating the node learning weights of subgraphs in different timestamps. In order to solve the dataset imbalance problem, we also apply the GraphSMOTE method for graph-structured data on public blockchain networks for the first time. Finally, we identify node labels in blockchain networks using a binary classification method and verify our proposed scheme through multiple rounds of experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availibility

Data and materials are available from the corresponding author on reasonable request.

References

  1. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev 21260 (2008). https://doi.org/https://bitcoin.org/bitcoin.pdf

  2. Zhang J, Zhong S, Wang T, Chao H-C, Wang J (2020) Blockchain-based systems and applications: a survey. J Intern Technol 21(1):1–14

    Google Scholar 

  3. Wang J, Wei B, Zhang J, Yu X, Sharma PK (2021) An optimized transaction verification method for trustworthy blockchain-enabled IIoT. Ad Hoc Netw 119:102526. https://doi.org/10.1016/j.adhoc.2021.102526

    Article  Google Scholar 

  4. Hao X, Ren W, Fei Y, Zhu T, Choo K-KR (2023) A blockchain-based cross-domain and autonomous access control scheme for internet of things. IEEE Trans Serv Comput 16(2):773–786. https://doi.org/10.1109/TSC.2022.3179727

    Article  Google Scholar 

  5. Liu Y, Zhang C, Yan Y, Zhou X, Tian Z, Zhang J (2023) A semi-centralized trust management model based on blockchain for data exchange in IoT system. IEEE Trans Serv Comput 16(2):858–871. https://doi.org/10.1109/TSC.2022.3181668

    Article  Google Scholar 

  6. Liu Y, Yu W, Ai Z, Xu G, Zhao L, Tian Z (2023) A blockchain-empowered federated learning in healthcare-based cyber physical systems. IEEE Trans Netw Sci Eng 10(5):2685–2696. https://doi.org/10.1109/TNSE.2022.3168025

    Article  Google Scholar 

  7. Liu L, Tsai W-T, Bhuiyan MZA, Peng H, Liu M (2022) Blockchain-enabled fraud discovery through abnormal smart contract detection on ethereum. Fut Gen Comput Syst 128:158–166. https://doi.org/10.1016/j.future.2021.08.023

    Article  Google Scholar 

  8. Wen T, Xiao Y, Wang A, Wang H (2023) A novel hybrid feature fusion model for detecting phishing scam on ethereum using deep neural network. Expert Syst Appl 211:118463. https://doi.org/10.1016/j.eswa.2022.118463

    Article  Google Scholar 

  9. Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in Bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv:1908.02591

  10. Canturk D, Karagoz P, Kim S-W, Toroslu IH (2023) Trust-aware location recommendation in location-based social networks: a graph-based approach. Expert Syst Appl 213:119048. https://doi.org/10.1016/j.eswa.2022.119048

    Article  Google Scholar 

  11. Guo Z, Wang H (2021) A deep graph neural network-based mechanism for social recommendations. IEEE Trans Ind Inf 17(4):2776–2783. https://doi.org/10.1109/TII.2020.2986316

    Article  Google Scholar 

  12. Guo S, Lin Y, Feng N, Song C, Wan H (2019) Attention based spatial–temporal graph convolutional networks for traffic flow forecasting. Proc AAAI Conf Artif Intell 33(01):922–929. https://doi.org/10.1609/aaai.v33i01.3301922

    Article  Google Scholar 

  13. Di Battista G, Di Donato V, Patrignani M, Pizzonia M, Roselli V, Tamassia R ( 2015) Bitconeview: visualization of flows in the bitcoin transaction graph. In: 2015 IEEE symposium on visualization for cyber security (VizSec), pp 1– 8. https://doi.org/10.1109/VIZSEC.2015.7312773

  14. Tian Z, Li M, Qiu M, Sun Y, Su S (2019) Block-def: a secure digital evidence framework using blockchain. Inf Sci 491:151–165. https://doi.org/10.1016/j.ins.2019.04.011

    Article  Google Scholar 

  15. Liu Y, Xiong Z, Hu Q, Niyato D, Zhang J, Miao C, Leung C, Tian Z (2022) Vrepchain: a decentralized and privacy-preserving reputation system for social internet of vehicles based on blockchain. IEEE Trans Veh Technol 71(12):13242–13253. https://doi.org/10.1109/TVT.2022.3198004

    Article  Google Scholar 

  16. Ren Y, Xiao Y, Zhou Y, Zhang Z, Tian Z (2023) CSKG4APT: a cybersecurity knowledge graph for advanced persistent threat organization attribution. IEEE Trans Knowl Data Eng 35(6):5695–5709. https://doi.org/10.1109/TKDE.2022.3175719

    Article  Google Scholar 

  17. Hassan MU, Rehmani MH, Chen J (2021) Anomaly detection in blockchain networks: a comprehensive survey. CoRR arXiv:2112.06089

  18. Kumar S, Spezzano F, Subrahmanian V, Faloutsos C ( 2016) Edge weight prediction in weighted signed networks. In: 2016 IEEE 16th international conference on data mining (ICDM). IEEE, pp 221–230

  19. Kumar S, Hooi B, Makhija D, Kumar M, Faloutsos C, Subrahmanian, V ( 2018) Rev2: fraudulent user prediction in rating platforms. In: Proceedings of the eleventh ACM international conference on web search and data mining. ACM, pp 333– 341

  20. Zheng P, Zheng Z, Wu J, Dai H-N (2020) XBlock-ETH: extracting and exploring blockchain data from ethereum. IEEE Open J Comput Soc 1:95–106. https://doi.org/10.1109/OJCS.2020.2990458

    Article  Google Scholar 

  21. Signorini M, Pontecorvi M, Kanoun W, Di Pietro R (2020) Bad: a blockchain anomaly detection solution. IEEE Access 8:173481–173490. https://doi.org/10.1109/ACCESS.2020.3025622

    Article  Google Scholar 

  22. Zhu H, Chen J, Li Z, Yin S (2021) Block-chain abnormal transaction detection method based on adaptive multi-feature fusion. J Commun 42(5):41. https://doi.org/10.11959/j.issn.1000-436x.2021030

    Article  Google Scholar 

  23. Farrugia S, Ellul J, Azzopardi G (2020) Detection of illicit accounts over the ethereum blockchain. Expert Syst Appl 150:113318. https://doi.org/10.1016/j.eswa.2020.113318

    Article  Google Scholar 

  24. Kim J, Nakashima M, Fan W, Wuthier S, Zhou X, Kim I, Chang S-Y (2022) A machine learning approach to anomaly detection based on traffic monitoring for secure blockchain networking. IEEE Trans Netw Serv Manag 19(3):3619–3632. https://doi.org/10.1109/TNSM.2022.3173598

    Article  Google Scholar 

  25. Wang J, Zhao C, He S, Gu Y, Alfarraj O, Abugabah A (2022) Loguad: log unsupervised anomaly detection based on word2vec. Comput Syst Sci Eng 41(3):1207–1222

    Article  Google Scholar 

  26. Bai Q, Zhang C, Xu Y, Chen X, Wang X (2020) Evolution of ethereum: a temporal graph perspective. CoRR arXiv:2001.05251

  27. Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding ethereum transaction records via a complex network approach. IEEE Trans Circuits Syst II Express Briefs 67(11):2737–2741. https://doi.org/10.1109/TCSII.2020.2968376

    Article  Google Scholar 

  28. Lin D, Wu J, Xuan Q, Tse CK (2022) Ethereum transaction tracking: inferring evolution of transaction networks via link prediction. Physica A: Stat Mech Appl 600:127504. https://doi.org/10.1016/j.physa.2022.127504

    Article  MathSciNet  Google Scholar 

  29. Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. Front Phys. https://doi.org/10.3389/fphy.2020.00204

    Article  Google Scholar 

  30. Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2022) Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Trans Syst Man Cybern Syst 52(2):1156–1166. https://doi.org/10.1109/TSMC.2020.3016821

    Article  Google Scholar 

  31. Pareja A, Domeniconi G, Chen J, Ma T, Suzumura T, Kanezashi H, Kaler T, Schardl T, Leiserson C (2020) EvolveGCN: evolving graph convolutional networks for dynamic graphs. Proc AAAI Conf Artif Intell 34(04):5363–5370. https://doi.org/10.1609/aaai.v34i04.5984

    Article  Google Scholar 

  32. Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020) Phishing scams detection in ethereum transaction network. ACM Trans Intern Technol. https://doi.org/10.1145/3398071

    Article  Google Scholar 

  33. Geng Z, Cao Y, Li J, Han Y (2022) Novel blockchain transaction provenance model with graph attention mechanism. Expert Syst Appl 209:118411. https://doi.org/10.1016/j.eswa.2022.118411

    Article  Google Scholar 

  34. Abubaker Z, Javaid N, Almogren A, Akbar M, Zuair M, Ben-Othman J (2022) Blockchained service provisioning and malicious node detection via federated learning in scalable internet of sensor things networks. Comput Netw 204:108691. https://doi.org/10.1016/j.comnet.2021.108691

    Article  Google Scholar 

  35. Martin K, Rahouti M, Ayyash M, Alsmadi I (2022) Anomaly detection in blockchain using network representation and machine learning. Secur Priv 5(2):192. https://doi.org/10.1002/spy2.192. (onlinelibrary.wiley.com/doi/pdf/10.1002/spy2.192)

    Article  Google Scholar 

  36. Li Y, Huang X, Li J, Du M, Zou N ( 2019) Specae: spectral autoencoder for anomaly detection in attributed networks. In: Proceedings of the 28th ACM international conference on information and knowledge management. CIKM’19. Association for computing machinery, New York, NY, USA, pp 2233– 2236. https://doi.org/10.1145/3357384.3358074

  37. Fan H, Zhang F, Li Z ( 2020) Anomalydae: dual autoencoder for anomaly detection on attributed networks. In: ICASSP 2020—2020 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 5685– 5689. https://doi.org/10.1109/ICASSP40776.2020.9053387

  38. Zhang C, Wei F, Liu Q, Tang ZG, Li Z ( 2017) Graph edge partitioning via neighborhood heuristic. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. KDD’17. Association for computing machinery, New York, NY, USA, pp 605–614 https://doi.org/10.1145/3097983.3098033

  39. Di Francesco Maesa D, Marino A, Ricci L (2018) Data-driven analysis of bitcoin properties: exploiting the users graph. Int J Data Sci Anal 6:63–80

    Article  Google Scholar 

  40. Zhao T, Zhang X, Wang S ( 2021) Graphsmote: imbalanced node classification on graphs with graph neural networks. In: Proceedings of the 14th ACM international conference on web search and data mining. WSDM’21. Association for computing machinery, New York, NY, USA, pp 833– 841. https://doi.org/10.1145/3437963.3441720

  41. Yang C, Wu Q, Wang J, Yan J ( 2023) Graph neural networks are inherently good generalizers: insights by bridging GNNs and MLPs. In: The eleventh international conference on learning representations. https://openreview.net/forum?id=dqnNW2omZL6

  42. Li G, Müller M, Ghanem B, Koltun V ( 2021) Training graph neural networks with 1000 layers. In: Meila M, Zhang T (eds) Proceedings of the 38th international conference on machine learning. Proceedings of machine learning research. PMLR, vol 139, pp 6437–6449. https://proceedings.mlr.press/v139/li21o.html

  43. Lim D, Hohne F, Li X, Huang SL, Gupta V, Bhalerao O, Lim SN (2021) Large scale learning on non-homophilous graphs: new benchmarks and strong simple methods. In: Ranzato M, Beygelzimer A, Dauphin Y, Liang PS, Vaughan JW (eds) Advances in neural information processing systems, vol 34. Curran Associates Inc, New York, pp 20887–20902

  44. Wang Z, Ye X, Wang C, Cui J, Yu PS (2021) Network embedding with completely-imbalanced labels. IEEE Trans Knowl Data Eng 33(11):3634–3647. https://doi.org/10.1109/tkde.2020.2971490

    Article  Google Scholar 

  45. Veličković P, Cucurull G, Casanova A, Romero A, Liò P, Bengio Y (2018) Graph attention networks arXiv:1710.10903

  46. Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:1609.02907

  47. Lorenz J, Silva MI, Aparício D, Ascensão JaT, Bizarro P ( 2021) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. In: Proceedings of the First ACM international conference on AI in finance (ICAIF’20). Association for computing machinery, New York, NY, USA. https://doi.org/10.1145/3383455.3422549

Download references

Acknowledgements

We wish to thank all data providers. We also wish to thank all colleagues, reviewers and editors provided valuable suggestions.

Funding

This work is supported by the National Natural Science Foundation of China (No. 61972208 and No. 62272239), Postgraduate Research and Innovation Plan of Jiangsu Province (No. KYCX20_0761), Jiangsu Agriculture Science and Technology Innovation Fund (No. CX(22)1007) and Natural Science Foundation of the Jiangsu Higher Education Institutions of China (No. 22KJB520027).

Author information

Authors and Affiliations

Authors

Contributions

Chenlei Liu developed idea, performed research, did the analyses and wrote the manuscript. Yuhua Xu did the analyses and collected data. Zhixin Sun verified and revised the manuscript.

Corresponding author

Correspondence to Zhixin Sun.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, C., Xu, Y. & Sun, Z. Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain. Knowl Inf Syst 66, 989–1010 (2024). https://doi.org/10.1007/s10115-023-02033-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-023-02033-y

Keywords

Navigation