Skip to main content

Phishing behavior detection on different blockchains via adversarial domain adaptation

Abstract

Despite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge of limited intelligence in the early stages of new chains, we propose ADA-Spear-an automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection. The model effectively identifies phishing behavior in new chains with limited reliable labels, addressing challenges such as significant distribution drift, low attribute overlap, and limited inter-chain connections. Our approach includes a subgraph construction strategy to align heterogeneous chains, a layered deep learning encoder capturing both temporal and spatial information, and integrated adversarial domain adaptive learning in end-to-end model training. Validation in Ethereum, Bitcoin, and EOSIO environments demonstrates ADA-Spear’s effectiveness, achieving an average F1 score of 77.41 on new chains after knowledge transfer, surpassing existing detection methods.

Introduction

Since the introduction of Bitcoin (Nakamoto 2008) in 2008, blockchain and cryptocurrencies have flourished. According to CoinMarketCap (CoinMarketCap), there are now 25,853 different cryptocurrencies, with a market capitalization exceeding one hundred billion dollars. Typically, a blockchain gives rise to its own cryptocurrency, and this financial characteristic has resulted in a surge of phishing activities. Statistics from Chainalysis (Chainanalysis) reveal that since 2017, more than 50% of blockchain security incidents are linked to phishing. By 2022, the proportion of phishing incidents has consistently risen to over 80%. Consequently, there is an urgent need to research methods for detecting phishing activities across different cryptocurrencies.

Traditional phishing activities generally involve the use of fake websites to induce users to provide private information. Thus, traditional phishing detection focuses on identifying these counterfeit websites and promptly warning users against interacting with them (Jain et al. 2017; Zuraiq and Alkasassbeh 2019; Orunsolu et al. 2022). Phishing activities on the blockchain, however, have developed new patterns. Criminals have shifted their focus from stealing private information to cryptocurrencies, employing a combination of social engineering and technical methods. Upon successfully obtaining cryptocurrencies, they disguise their identities through multiple transactions, increasing the covert nature of their activities. Moreover, as different cryptocurrencies continually emerge, possessing reliable tagged data for each is extremely valuable. Newly emerged cryptocurrencies lack any tagged data, requiring a significant amount of time to accumulate relevant intelligence databases. At that point, the damage has already occurred, significantly dampening user enthusiasm and hindering the development of new chains.

This paper aims to tackle the challenge of detecting phishing activities in diverse blockchain networks (target blockchain) by utilizing labeled data from source blockchains, as illustrated in Fig. 1. We addresses the issue of ineffective phishing detection on newly emerged chains during their early stages, characterized by limited on-chain annotations and differing data distributions across chains. Current detection methods cannot be directly generalized to effectively detect phishing activities on new chains, resulting in delays in halting phishing behavior during the initial stages of chain emergence. While mature chains like Ethereum possess more abundant data and established detection methods, the lack of information on target chain samples poses a challenge. To address this, we propose a adversarial domain adaptation-based method (Pan and Yang 2009; Ganin et al. 2016; Shen et al. 2018; Goodfellow et al. 2020) for phishing detection in small-sample public chains with limited annotations on the target chain named ADA-Spear.

The challenges are as follows: Firstly, current detection methods heavily depend on manual feature engineering, require substantial expert knowledge, and are unsuitable for mining deep patterns on the blockchain. Moreover, their generalizability is weak, making them challenging to apply to different chains. Secondly, there exists a substantial distribution drift (Wiles et al. 2021) between different chains, accompanied by low attribute overlap. This implies that there are differences in both the data distribution and feature space between the source and target blockchains. Therefore, the phishing address patterns on the source blockchain are difficult to directly apply to the target blockchain, leading to overfitting of the model to the features of the source chain and a subsequent decrease in the model’s generalization ability. Additionally, the presence of coin mixing and other anonymity services prevents the cross-chain transfer of edge information from the source to the target chain, hindering knowledge transfer. Thirdly, in the source chain, trustworthy labels are sparse. Even in Ethereum, which has abundant labels, phishing activity labels still only account for about 0.2% of total addresses (Etherscan). This scarcity of usable information in the source chain leads in the inadequacy of full supervision learning robustness.

Building upon this, we introduce adversarial domain adaptation techniques from transfer learning and proposes a small-sample phishing detection method for public chains. Firstly, we propose a subgraph construction algorithm based on chain structure to transform heterogeneous graphs from different chains into homogeneous graphs, thereby alleviating the problem of significant data distribution drift between chains structurally. Secondly, we introduce a hierarchical representation encoder at both node and subgraph levels to capture spatial and temporal information of node behaviors, obtaining high-dimensional representations of node features. This encoder is better suited for mining deep patterns in blockchain data. Thirdly, we apply adversarial domain adaptation networks to the node representations across different chains to mitigate the low overlap of attributes and data distribution drift between the source and target chains. Simultaneously, the adversarial domain adaptation network effectively enhances knowledge transfer capability when there is no cross-chain edge for information propagation from the source to the target chain, enabling timely and effective phishing detection on new target chains with limited labels (Singh 2019; Sayadi et al. 2019; Chen et al. 2020a, b; Wu et al. 2020; Ao etal. 2021; Xu et al. 2018; Wu et al. 2020; Perozzi et al. 2014; Grover and Leskovec 2016; Wang et al. 2016, 2017; Ji et al. 2021; Heimann and Koutra 2017; Hamilton et al. 2017; Kipf and Welling 2016; Zheng et al. 2023; Yang et al. 2016; Fang et al. 2013; Ni et al. 2018; Xu et al. 2017; Pan and Yang 2009; Ganin et al. 2016; Shen et al. 2018; Goodfellow et al. 2020).

Fig. 1
figure 1

Cross-blockchain-network phishing detection diagram: known features and labels of the source network are used to detect nodes with unknown labels in the target network

Specifically, ADA-Spear aims to characterize address behavior patterns and achieve knowledge transfer of behavior patterns from the source network to the target network, thereby facilitating the detection of phishing activities across different chains. The ’ADA’ in ADA-Spear stands for Adversarial Domain Adaptation, and ’Spear’ symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection. In the subgraph construction method, we treat the target address as the central node, and after obtaining its second-order neighbor nodes, propose a reduction strategy for adapting to the full-sample gradient descent training in neural networks. Subgraphs are established, abstracting the phishing detection into a subgraph classification task (Zhang et al. 2021; Narayanan et al. 2017). The main idea of the detection model is to learn different inter-class subgraph representations through a network encoder with multi-dimensional feature fusion and invariant subgraph representations across different chains through adversarial domain adaptation. It should be noted that multidimensional features refer to time-based behavioral features, space-based behavioral features, and source data on blocks.Consequently, ADA-Spear consists of an encoder module that characterizes address behavior and a domain adaptation module. It should be noted that multidimensional features refer to temporal-based behavioral features, spatial-based behavioral features, and addresses’ source data on blocks.

On one hand, the encoder module primarily aims to better characterize address behavior and learn class-level discriminative subgraph representations. It trains an effective classifier using existing label and considers the temporal evolution of behavior to characterize node-level feature representations and subgraph-level behavior patterns (Jiao et al. 2021). On the other hand, the adversarial domain adaptation module is designed to mitigate the distribution drift between the source and target networks so that transfer phishing pattern knowledge between chains. It employs adversarial learning to learn invariant subgraph representations across different chains, facilitating the transfer of behavior pattern knowledge from the source network to the target network. The training process is similar to that of Generative Adversarial Networks (GANs) (Goodfellow et al. 2020; Dai et al. 2018; Pan et al. 2018; Dai et al. 2019), where the encoder learns inter-chain invariance, and the domain discriminator distinguishes whether subgraph representations originate from the source or target domain. By combining these two parts, ADA-Spear can learn class-level discriminative subgraph representations and inter-chain invariant representations, facilitating the transfer of class information across different chains.

We choose Ethereum, Bitcoin, and EOSIO as three blockchain platforms, serving respectively as the source and target domains, to research cross-blockchain-network phishing behavior detection. In summary, our contributions are:

  • We propose a novel approach ADA-Spear, a neural network detection model with adversarial domain adaptation and multi-dimensional feature fusion, tackling the challenge of detecting phishing activities in diverse blockchain networks.

  • The proposed model ADA-Spear comprises an encoder that effectively characterizes on-chain phishing activities and an adversarial domain adaptation module. It considers the temporal-based of behavior features, spatial-based behavioral features and addresses’ source data on blocks, effectively characterizing phishing activities at both node and subgraph levels. By learning high-dimensional behavioral patterns and alleviating the issue of distribution drift between different chains, ADA-Spear can detect phishing activity effectively on new target chains with few or no labels.

  • We conduct detailed and extensive experiments in real Ethereum, Bitcoin, and EOSIO environments to demonstrate the effectiveness of ADA-Spear. Our method achieves an average F1-score exceeding 76% in the target domain with no labels and a label rate of 5%, surpassing existing advanced detection methods. Furthermore, we analyze phishing activities across diverse chains, highlighting the model’s exceptional performance and scalability. This proves its robustness, even in instances of distribution differences between chains.

Related work

The detection of phishing activities on blockchain primarily employs feature engineering and graph analysis methods, where graph analysis can further be divided into single-network learning, graph-based semi-supervised learning, and cross-network learning methods.

Feature engineering based method

Feature engineering methods (Sayadi et al. 2019; Singh 2019) rely heavily on expert knowledge of blockchain phishing behavior, making it time-consuming and labor-intensive. Toyoda et al. (2018) use seven types of statistical information on Bitcoin to perform multi-classification of Bitcoin services, including the detection of anomalous services. Chen et al. (2020a) extract 219 features in Ethereum to identify phishing activities, representing a comprehensive feature extraction work in early feature engineering methods. Jourdan et al. (2018) build repeat patterns by extracting features from Bitcoin and use LightGBM for subsequent classification. Ostapowicz (?) and others directly utilize information recorded on the blockchain as features, exploring the performance of machine learning methods like Random Forest, Support Vector Machine (SVM), and XGBoost in fraud detection.While feature engineering-based methods can detect certain behaviors, with the advancement of blockchain technology, anomalous behaviors (including phishing activities) are becoming increasingly complex. Simple extraction of block features fails to accurately capture these more intricate behaviors. Additionally, relying on feature engineering methods is highly dependent on expert knowledge, making it difficult to obtain higher-order information about behavioral features. Additionally, the extracted features are limited to the current chain, posing challenges in applying them to new chains and resulting in low generalizability.

Graph analysis based method

Single network learning method

This is an unsupervised learning method that can learn node representations based on the network’s topological structure or other information for subsequent tasks like node classification, as seen in algorithms like DeepWalk. Generally, these methods use unsupervised learning to embed network structural information, followed by training classifiers for node or subgraph classification (Wang et al. 2016, 2017; Ji et al. 2021). Yuan et al. (2020) are the first to use DeepWalk (Perozzi et al. 2014) and Node2vec (Grover and Leskovec 2016) on blockchain to learn topological representations of addresses, later using machine learning for address classification. As Etheruem phishing itself also exhibits its own behavioral characteristics, so Wu et al. (2020) and Lin et al. (2020) combine Ethereum transaction amounts and timestamps to extract node representations through biased walks, using single-class SVM and other machine learning methods for phishing node detection. Ao etal. (2021) refine time-based repeat patterns in Ethereum and propose a community detection method to extract phishing node pattern representations. However, such methods lack the ability to generalize to other networks because they do not maintain a similarity structure that “brings closer” the embeddings of nodes or subgraphs of the same category across different networks (Heimann and Koutra 2017). Additionally, their classification effectiveness is not as robust as graph-based semi-supervised learning methods. Therefore, these methods are also not applicable for detecting cross-chain phishing behaviors.

Graph-based semi-supervised learning method

To further improve the classification of phishing activities, later methods often use graph-based semi-supervised learning (Hamilton et al. 2017; Kipf and Welling 2016; Zheng et al. 2023). Since blockchain’s data structure and massive transaction data are best modeled as a graph structure, they are trained in a supervised manner from a graph perspective. Patel et al. (2020) use graph convolution network (GCN) to extract structural information in Ethereum and classify fraud nodes using a single-class SVM. This method enhances the accuracy of phishing detection on the blockchain. To further enhance the extraction of structural information, Chen et al. (2020a) modify the initial features of GCN, effectively improving classification accuracy. Li et al. (2020) consider the topological structural differences between fraudulent and benign addresses in the Bitcoin network and use XGBoost for address classification. Zhang et al. (2021) use a hierarchical approach to extract Ethereum’s topological structure for subgraph representation, training neural networks end-to-end for phishing subgraph identification. This method extends the dimensionality of address analysis. Subsequent studies further consider temporal behavior, with Li et al. (2022) constructing Ethereum as a multi-graph, transforming multiple edges into sequences, and embedding them into LSTM to obtain temporal representations of phishing nodes, effectively improving detection accuracy. Graph-based semi-supervised learning methods adopt an end-to-end approach, integrating network structure, node attributes, and labels, demonstrating effective classification results in single networks. However, these methods face challenges in generalizing to other networks experiencing significant distribution drift (Yang et al. 2016).

Cross-network learning method

Currently, blockchain phishing detection methods lack generalizability and do not employ cross-blockchain-networklearning models. However, to promptly detect phishing activities on new chains, research on cross-blockchain-network phishing detection methods is necessary. Existing methods utilizing source network information to assist in identifying target network behavior include: Fang et al. (2013) propose the NetTr method, which only transfers topological information in networked data, but it is computationally expensive and transfers limited information. Shen et al. (2020) propose CDNE, learning representations of nodes within multiple networks and minimizing the Maximum Mean Discrepancy (MMD) loss function to mitigate distribution drift between nodes in different networks. To further alleviate domain drift during knowledge transfer, Ganin et al. propose the domain adaptation method DANN (Ganin and Lempitsky 2015), learning inter-domain invariance through a min-max game approach. Building on DANN, Shen et al. (2018) use Wasserstein distance to quantify inter-domain differences for better gradient properties, thereby improving transfer effectiveness. Current methods that leverage edge information across networks to improve classification typically involve learning embeddings across multiple networks, but heavily rely on inter-network connections. Although cross-chain transactions can occur between different blockchains, establishing inter-network edges becomes challenging after passing through cross-chain bridges or mixing services, rendering such methods unsuitable for the problem addressed in our study. For the issue addressed in this paper, which involves phishing detection on new chains with limited annotations, cross-network transfer learning algorithms are appropriate. These algorithms primarily address the adverse effects on models caused by domain shift during knowledge transfer from the source domain to the target domain. This paper will use adversarial domain adaptation based on graph networks to generalize the model to different chains and promptly detect phishing activities.

Preliminaries

This section mainly introduces the definition and feature construction of on-chain interaction graphs and the definition of the issues studied in this paper. Table 1 shows the main symbols used in our framework.

On-chain interaction graph

This subsection defines the Ethereum, Bitcoin and EOSIO networks modeled as graph structures and gives the Graph definition after subtraction.

Ethereum Attribution Graph (E-AIG) A directed, weighted, homogeneous multigraph \(G = (V^e, E^e, \textbf{A}^e, \textbf{F}_v^e, \textbf{F}_e^e, Y^e)\), where \(V^e\), \(E^e\), and \(\textbf{A}^e\) respectively represent the sets of nodes, directed edges, and the adjacency matrix. The edge set \(E^e\) is defined as \(E^e = \{(v_i,v_j,\textbf{F}_e^e)|v_i,v_j \in V^e\}\). \(\textbf{F}_v^e\) and \(\textbf{F}_e^e\) respectively represent the feature matrices for Ethereum nodes and edges, as detailed in Sect. 3.2. Some nodes in the E-AIG are labeled with \(y_i \in Y^e\), where \(Y^e = \{(v_i,y_i)|v_i \in V^e\}\).

EOSIO Address Interaction Graph (EO-AIG) The definition is the same as for the E-AIG and will not be repeated.

Bitcoin Address-Transaction Interaction Graph (B-ATIG) A directed, weighted, heterogeneous multigraph \(G = (V_a^b, V_t^b, E^b, \varvec{F}^b_v, \varvec{F}^b_e, Y^b)\), where \(V_a^b\) and \(V_t^b\) respectively represent the sets of address nodes and transaction nodes, \(E^b\) represents the set of edges, defined as \(E^b = \{(v_i, v_j, \varvec{F}^b_e) | v_i \in V_a^b \cup V_t^b, v_j \in V_a^b \cup V_t^b\}\). \(\varvec{F}_v^b\) and \(\varvec{F}_e^b\) respectively represent the feature matrices for Bitcoin address nodes and edges, as detailed in Sect. 3.2. Some address nodes in the B-ATIG are labeled with \(y_i \in Y^b\), where \(Y^b = \{(v_i, y_i) | v_i \in V^b_a\}\).

As the original B-ATIG is a heterogeneous graph, to align with the graph network of E-AIG and reduce computational complexity, the strategy proposed in Sect. 4.1 is used to remove transaction nodes from B-ATIG, converting it into a homogeneous graph B-AIG.

Bitcoin Address Interaction Graph (B-AIG) A directed, weighted, homogeneous multigraph \(G = (V^b, \widetilde{E}^b, \varvec{A}^b, \varvec{F}^b_v, \widetilde{\varvec{F}}^b_e, Y^b)\), where \(V^b\), \(\widetilde{E}^b\), and \(\varvec{A}^b\) are the sets of address nodes, transformed set of directed edges, and adjacency matrix, respectively. The transformed edge set \(\widetilde{E}^b\) is defined as \(\widetilde{E}^b = \{(v_i, v_j, \widetilde{\varvec{F}}^b_e) | v_i, v_j \in V_a^b\}\), and \(\widetilde{\varvec{F}}^b_e\) is the edge feature matrix after the removal of transaction nodes.

E-AIG, EO-AIG, and B-AIG are all dense connected homogeneous multigraphs, which increases the complexity during subsequent knowledge transfer. Thus, through feature reconstruction, interaction aggregation, and node reduction as described in Sect. 4.1, the directed graphs r-AIG (E-AIG\(\rightarrow\)rE-AIG, EO-AIG\(\rightarrow\)rEO-AIG, B-AIG\(\rightarrow\)rB-AIG) are obtained.

Reduced Address Interaction Graph (r-AIG) A directed, weighted, homogeneous graph \(G = (V^r, E^r, \varvec{A}^r, \varvec{F}^r_v, \varvec{F}^r_e, Y^r)\), where \(V^r\) is the set of nodes after the TopK reduction described in Sect. 4.1, \(E^r = \{(v_i, v_j, \varvec{F}^r_e) | v_i, v_j \in V^r\}\) is the remaining set of edges, and \(\varvec{A}^r\) is the adjacency matrix. \(\varvec{F}^r_v\) and \(\varvec{F}^r_e\) are the feature matrices for the nodes \(V^r\) and edges \(E^r\), respectively. Some nodes in r-AIG are labeled with \(y_i \in Y^r\), where \(Y^r = \{(v_i, y_i) | v_i \in V^r\}\).

Feature construction

Node features and edge features in Ethereum, Bitcoin, and EOSIO are categorized into three types: transaction time, transaction amount, and transaction count. Each type is differentiated by direction and further classified into incoming and outgoing transactions. In multigraphs, node features primarily include overall subgraph information like lifespan, total amount, degree, and the number of active nodes. Edge features mainly encompass information for each transaction, including block number, timestamp, transaction amount, and transaction fees. For transaction amount-type features, the maximum, minimum, and average functions will be used. Transaction amount-type features will utilize the maximum, minimum, and average functions. Similarly, transaction count-type features, based on the same approach, are combined with transaction amount-type features to derive per-transaction average features.

Table 1 Main symbols used in our framework

Problem definition

The primary focus of this paper is on detecting cross-blockchain-network phishing behavior through domain adaptation. Specifically, it leverages knowledge of phishing behavior in the source domain to assist in recognizing phishing behavior in a new target domain. This process transforms the phishing behavior recognition challenge into a graph classification problem.

The source network is denoted as \(G^s = (V^s, E^s, \varvec{A}^s, \varvec{F}^s_v, \varvec{F}^s_e, Y^s)\), where \(V^s = \{v_1, v_2, \ldots , v_{n^s}\}\) represents the set of address nodes, \(E^s \subseteq \{(v_i, v_j) | v_i, v_j \in V^s\}\) represents the set of interaction edges, \(\varvec{A}^s \in \mathbb {R}^{n^s \times n^s}\) represents the adjacency matrix, \(\varvec{F}_v^s \in \mathbb {R}^{n^s \times c_n^s}\) represents the node feature matrix, with \(c_n^s\) being the number of features for each node, \(\varvec{F}_e^s \in \mathbb {R}^{m^s \times c_e^s}\) represents the edge feature matrix, with \(m^s = |E^s|\) and \(c_e^s\) being the number of features for each edge, \(Y^s = \{ (v_i, y_i) | v_i \in V^s \}\) represents the label set for some labeled address nodes, where if \(y_i = 1\), the node is a phishing node, otherwise \(y_i = 0\). Similarly, the target network is denoted as \(G^t = (V^t, E^t, \varvec{A}^t, \varvec{F}^t_v, \varvec{F}^t_e)\). In this approach, r-AIG is used as both the source and target networks.

A subgraph centered around \(v^r\) is defined as \(g_{v^r} \subset G^r\), where \(r \in \{s, t\}\), the source domain is \(D^s = (G^s, f(g_{v^r}^s))\), and the target domain is \(D^t = (G^t, f(g_{v^r}^t))\), with \(D^s \ne D^t\), and \(f(g)\) being the subgraph classification task. The problem studied in this paper is, given a distributional difference but identical label sets between source and target domains, to learn a classification function \(f(g) \mapsto y_i\) with the aid of source domain information, in order to accurately identify the category of \(g_{v^r}^t\) in the target domain.

Cross-blockchain-network phishing behavior detection method

In this section, we offer a comprehensive overview of the ADA-Spear phishing detection method’s structure, as illustrated in Fig. 2. ADA-Spear is applicable both for phishing behavior recognition and mining within the same blockchain, as well as for cross-blockchain-network phishing detection. When examining a node v, ADA-Spear takes the r-AIG \(g_v\) centered around v as input and outputs the node’s label. A label of 1 indicates a phishing node, while 0 represents a benign node. ADA-Spear comprises the following components: Firstly, to characterize on-chain interaction behavior, an r-AIG centered around v is constructed. Secondly, to depict the complex behavior of node v, an r-AIG encoder is designed, incorporating temporal feature analysis and attention mechanisms. Thirdly, an adversarial domain adaptation transfer learning module is developed, adapting the encoder to the address behavior representation on the target chain and identifying phishing behavior on the target chain. Finally, a training module is designed, integrating domain adaptive transfer learning with binary classification tasks for training.

Fig. 2
figure 2

The framework of cross-blockchain-network phishing behavior detection method

Subgraph construction

Ethereum and Bitcoin data both reach million-level scales, resulting in excessively large graph data for their respective AIGs. This poses a challenge for full-batch training in graph nerual network (GNN)-based neural networks. Furthermore, an abundance of redundant data hinders effective transfer learning, making the migration of source domain features to the target domain challenging. This may result in issues like overfitting, impacting the effectiveness of phishing detection. Consequently, this subsection aligns and simplifies E-AIG/EO-AIG and B-ATIG, creating a unified r-AIG. The subgraph construction process is illustrated in Fig. 3.

Fig. 3
figure 3

ADA-Spear subgraph construction flowchart

Sampling original data into multigraphs

In this subsection, the second-order nodes of the target address are sampled from the original block data of Ethereum and EOSIO to create the subgraph representing the target address, resulting in the multigraph E-AIG. Given Bitcoin’s distinct organizational structure from Ethereum, the original block data for Bitcoin involves sampling the second-order transaction nodes of the target address and the next-order addresses corresponding to these transactions. This process results in the creation of a heterogeneous graph containing transaction nodes and address nodes, forming the multigraph B-ATIG.

The design of the sampling method outlined above is driven by two key considerations: a. Phishing and benign nodes exhibit distinct behavioral patterns, manifested in their interactions with neighboring nodes, i.e., local structural features on the graph; b. Subgraphs, in comparison to the full graph, undergo a significant reduction in scale and are adaptable to the training method of the model network.

To facilitate adaptation to the later-designed encoder and adversarial domain adaptive learning, aligning EAIG/EO-AIG with B-ATIG is essential. This involves transforming B-ATIG into B-AIG. The transformation process is shown in Fig. 4. In the heterogeneous graph B-ATIG, all nodes of type “transaction” \(n_{tx} \in N_{tx}\) and their corresponding edge pairs \((n_{tx_{pre}}, n_{tx}), (n_{tx}, n_{tx_{next}})\) are extracted. By removing \(n_{tx}\), the edge \((n_{tx_{pre}}, n_{tx_{next}})\) is formed. The attributes of the edge \((n_{tx}, n_{tx_{next}})\) are retained as new edge attributes. This process concludes with the construction of the homogeneous multigraph B-AIG.

Node and edge feature construction

Following the analysis of phishing behaviors, features exhibit strong correlations with amount, time, frequency, and degrees. The feature construction schematic is shown in Fig. 4a, b. In the AIGs formed by the three chains, node attributes are denoted \(f_v\in F_v\). Specifically, \(f_v = (\text {in}, \text {out}), \quad f_e = (t, a)\) where in and out represent the in-degree and out-degree of the node, respectively. Edge attributes are represented as \(\quad f_e = (t, a), f_e \in F_e\), where t indicates the order of the transaction occurrence in the subgraph. Specifically, \(t = \text {rank}(\text {time}, g_i), \quad i \in \{1,2, \ldots , \text {count}\}\), with time being the transaction timestamp, \(g_i\) being the subgraph containing the target node, and count being the total number of nodes. Additionally, a represents the transaction amount type attribute.

Fig. 4
figure 4

ADA-Spear directed graph construction flow chart

Merging interactions into a directed graph

To transform multigraphs into directed graphs, edge aggregation is employed, as shown in Fig. 4b, c. For clarity, the figure only displays the aggregation method for the sum of amounts. Given the temporal characteristics of phishing behaviors, the graph preserves crucial temporal information of transactions to the fullest extent. Multiple parallel edges between two nodes are aggregated into a single edge, and the attributes on the edge \((v_i, v_j)\) are \(((\Sigma a_{t1}, \text {Max}(a_{t1}), \text {Min}(a_{t1}), \text {Mean}(a_{t1})), \ldots , (\Sigma a_{t_M}, \text {Max}(a_{t_M}), \text {Min}(a_{t_M}), \text {Mean}(a_{t_M})))\) where \(\Sigma a_{tM}\), \(\text {Max} (a_{tM})\), \(\text {Min}(a_{tM})\), \(\text {Mean}(a_{tM})\), \(m\in M\) respectively represent the sum, maximum, minimum, and mean of all transaction amounts at the mth moment, and M indicates the maximum occurrence sequence of transactions in the subgraph.

It should be noted that different target nodes will form different subgraphs, and the number of transactions within different subgraphs may vary. Therefore, the dimensions of the edges in different subgraphs may differ after aggregation. Subsequently, the issue of dimension alignment will be addressed by using a variable-length long short-term memory (LSTM).

Graph reduction with directed edges

Although sampling second-order nodes reduces the data volume compared to the full blockchain interaction graph, the data volume remains significant. Therefore, further reduction of the directed AIG, as shown in Fig. 5, occurs while retaining information relevant to phishing detection. In this subsection, the TopK technique is utilized to sample nodes at each order. The strategy is based on the following considerations: When comparing nodes of the same order, nodes with fewer zeros in the feature vector of the edges they belong to (i.e., fewer zeros), a larger sum of all amounts in the vector (i.e., larger sum), and higher degrees (i.e., higher degree) are more important and have a higher probability of being retained. In each order, the weight at which each node is retained, denoted as w, can be expressed as:

$$\begin{aligned} w(v_i) = rank((c_{zero}+a_{all}+d), hop_{v_i}, g_{v_i}) \end{aligned}$$
(1)

where each node utilizes the sum of all incoming edges and outgoing edges \(c_{zero}+a_{all}+d\), \(hop_{v_i}\) denotes the current order of node \(v_i\), \(g_{v_i}\) represents the subgraph where \(v_i\) belongs. After the final iteration and reduction, the resulting node set can be represented as:

$$\begin{aligned} V^{r} = & \cup _{{v_{i} \in V^{r} }} TopK(G = g_{{v_{i} }} ,K,w(v_{i} ),hop), \\ & \;hop \in \{ 0,1,2\} \\ \end{aligned}$$
(2)

In conclusion, a reduced sub-directed graph is obtained. For the reduction process in this paper, we choose \(K = 25\).

Fig. 5
figure 5

ADA-Spear directed graph reduction flow chart

Encoder network

This section presents a comprehensive overview of the ADA-Spear model’s feature extractor \(f_{encod}(\varvec{A},\varvec{F}_v,\varvec{F}_e; \varvec{\theta }_{encod})\). It employs a hierarchical attention mechanism based on LSTM to map the behavioral features of target nodes into representation vectors for subsequent transfer learning. The schematic diagram is illustrated in Fig. 6. Additionally, the encoder, in conjunction with the prediction head described in the next section, can also be applied for phishing detection within the same blockchain domain. In the following, the specific details of the encoder will be presented.

Fig. 6
figure 6

The architecture of ADA-Spear encoder network

Node level addreses representation based on temporal and spatial behavior

Node Level Address Representation Based on Temporal Behavior In the previously discussed r-AIG, nodes are encoded considering transaction flow and frequency, while edges are encoded based on transaction occurrence order. Since AIG is a graph centered around addresses, and each node has both incoming and outgoing transactions with its neighboring nodes, it is essential to preserve the temporal characteristics of transaction information. Therefore, in this subsection, the edge features between the central node \(v_i\) and its neighboring nodes are aggregated into node \(v_i\). The input vector of the central node \(v_i\) is represented as \(\varvec{f}^{'}_{v_i} = [(f^{t_1}_{e\_in}, f^{t_1}_{e\_out}),(f^{t_2}_{e\_in}, f^{t_2}_{e\_out}), \ldots (f^{t_m}_{e\_in}, f^{t_m}_{e\_out})]\). \(\varvec{f}_{v_i}^{'}\) serves as the input for a variable-length LSTM, resulting in embedded vectors \(\varvec{h}_{v_i}^{t}\). This operation is performed for all nodes on the graph, resulting in \(\varvec{h}_{v_i}^{t}\), where \(v_j\) represents the neighbors of \(v_i\). Since the total number of time steps \(m\) may vary between different subgraphs, a variable-length LSTM is employed to adapt to \(m\). Figure 6a presents a visualization of this process.

Specifically, for any node \(v_k, k\in \{i,j\}\), \(\varvec{f}_{v_k}^{'}\) is used as the LSTM input, and the forgetting gate and input gate are calculated as follows:

$$\begin{aligned} \varvec{fg}_{v_k}^t= & {} \sigma (\varvec{W}_{v_k}^{fg}[\varvec{h}_{v_k}^{t_{h-1}},({f_{e_{v_k}}^{t_h}}_{\_in},{f_{e_{v_k}}^{t_h}}_{\_out})]+\varvec{b}_{v_k}^{fg}) \end{aligned}$$
(3)
$$\begin{aligned} \varvec{i}_{v_k}^{t_h}= & {} \sigma (\varvec{W}_{v_k}^{i}[\varvec{h}_{v_k}^{t_{h-1}},({f_{e_{v_k}}^{t_h}}_{\_in},{f_{e_{v_k}}^{t_h}}_{\_out})]+\varvec{b}_{v_k}^{i}) \end{aligned}$$
(4)

Then, we calculate the current candidate cell state:

$$\begin{aligned} \widetilde{\varvec{C}}_{v_k}^{t_h} = tanh(\varvec{W}_{v_k}^{C}[\varvec{h}_{v_k}^{t_{h-1}},({f_{e_{v_k}}^{t_h}}_{\_in},{f_{e_{v_k}}^{t_h}}_{\_out})]+\varvec{b}_{v_k}^{C}) \end{aligned}$$
(5)

Combine the forget gate and input gate to update the current cell state as follows:

$$\begin{aligned} \varvec{C}_{v_k}^{t_h} = \varvec{fg}_{v_k}^{t_h} \varvec{C}_{v_k}^{t_{h-1}}+\varvec{i}_{v_k}^{t_h} \widetilde{\varvec{C}}_{v_k}^{t_h} \end{aligned}$$
(6)

At time step t, the current cell’s output hidden layer is expressed as:

$$\begin{aligned} \varvec{o}_{v_k}^{t_h}= & {} \sigma (\varvec{W}_{v_k}^{o}[\varvec{h}_{v_k}^{t_{h-1}},({f_{e_{v_k}}^{t_h}}_{\_in},{f_{e_{v_k}}^{t_h}}_{\_out})]+\varvec{b}_{v_k}^{o}) \end{aligned}$$
(7)
$$\begin{aligned} \varvec{h}_{v_k}^{t_h}= & {} \varvec{o}_{v_k}^{t_h} tanh(\varvec{C}_{v_k}^{t_h}) \end{aligned}$$
(8)

Here, \(\sigma\) represents the sigmoid activation function, and \(t\) takes values from the set \(\{t_1,t_2, \ldots ,t_m\}\).

Node Level Address Representation Based on Address Source Data on Blocks Subsequently, the node features \(\varvec{f}_{v_k}\) are concatenated with \(\varvec{h}_{v_k}^T = (\varvec{h}_{v_k}^{t_1}, \varvec{h}_{v_k}^{t_2}, \varvec{h}_{v_k}^{t_3}, \ldots , \varvec{h}_{v_k}^{t_m})\), resulting in \(\widetilde{\varvec{h}}_{v_k} = [\varvec{f}_{v_k} \Vert \varvec{h}_{v_k}^T]\). The same process is applied to other neighboring nodes. At this point, each node has aggregated edge features into the node and has fused them with the original node features, preserving transaction information based on time sequences.

Node Level Address Representation Based on Spatial Behavior After obtaining the features of each node, this step aims to retain the most relevant neighbor interaction information between nodes. In phishing behavior, each neighboring node contributes differently to phishing detection. For example, a phishing address may engage in small transactions with benign addresses to obfuscate its malicious behavior, which can interfere with the detection process and should be excluded. Leveraging this insight, the paper utilizes the graph attention mechanism (GAT) mechanism to understand the distinct contributions of each neighbor node to phishing behavior detection and learn the hidden layer representation between each pair of nodes. The process is shown in Fig. 6a.

Specifically, for any node \(v_i\) in the subgraph, the attention score between it and its neighbor node \(v_j\) is calculated as follows:

$$\begin{aligned} a_{i,j} = \text {LeakyRelu} (\varvec{W}_a \widetilde{\varvec{h}}_{v_i}, \varvec{W}_a \widetilde{\varvec{h}}_{v_j}) \end{aligned}$$
(9)

where \(\varvec{W}_a\) represents the weight to be learned in a single-layer feedforward network, and LeakyRelu is used as a non-linear activation layer for subsequent normalization operations.

To ensure that the attention scores between nodes are comparable, a normalization operation is performed:

$$\begin{aligned} \alpha _{i,j} = \text {softmax}(a_{i,j}) = \frac{e^{a_{i,j}}}{\sum _{k\in N(i)} e^{a_{i,k}}} \end{aligned}$$
(10)

where \(N(i)\) represents all neighboring nodes of node \(v_i\).

Neighboring nodes are aggregated based on their attention scores to obtain the representation of node \(v_i\):

$$\begin{aligned} \widehat{\varvec{h}}_{v_i} = \sigma \left( \alpha _{i,i} \varvec{W}_{\alpha } \widetilde{\varvec{h}}_{v_i} + \sum \alpha _{i,j} \varvec{W}_{\alpha } \widetilde{\varvec{h}}_{v_j}\right) \end{aligned}$$
(11)

where \(\varvec{W}_{\alpha }\) represents the weight of the linear layer to be learned, and \(\sigma\) is a non-linear activation function, with ReLU chosen in this case. After iteration, the node-level embedding \(\widehat{\varvec{h}}_{v_i}\) is obtained for each node.

The specific iteration process is shown in Fig. 7. Iteration is performed using the graph attention layer at the \(hop\) level, which involves propagating, transforming, and aggregating the representations between nodes in each subgraph. This process allows the interaction behavior of nodes at each level to be fully embedded into vectors, where \(hop\) represents the order of each subgraph. The initial input to the iteration layer is the node-level representations obtained from the temporal feature extraction, denoted as \(\widehat{h}_{v_i}^0 = \widehat{h}_{v_i}\), where the neighboring nodes include all first-order nodes in the subgraph. After \(hop\) iterations, the final node-level representations for all nodes in a subgraph, denoted as \(\widehat{H}^{hop}_g = \{\widehat{h}_{v_i}\}_{v_i \in V_g}\), contain all the information about second-order nodes in that subgraph.

Fig. 7
figure 7

The process of encoder iteration

Subgraph-level behavior pattern representation

This module aims to characterize the behavior patterns of each target subgraph. The identity and methods of the phisher can lead to varied subgraph differences in phishing behavior on Ethereum. Therefore, it is necessary to design subgraph-level feature characterization. To overcome the limitations of flat GNNs), this subsection combines DiffPool technology (Ying et al. 2018) hierarchically to aggregate subgraph information, as shown in Fig. 6c.

Specifically, the representation \(\varvec{H}_g^{(0)} = \widehat{\varvec{H}}_g^{hop}\) and the subgraph adjacency matrix \(\varvec{A}_g^{(l)}\) are used as inputs to the DiffPool layer, which calculates the representation matrix \(\varvec{Z}_g^{(l)}\) and the assignment matrix \(\varvec{S}_g^{(l)}\in \mathbb {R}^{{n_l}\times {n_{l+1}}}\), where \(n_l\) is the number of nodes in the \(l\)th DiffPool layer:

$$\begin{aligned} \begin{aligned} \varvec{Z}_g^{(l)}&= GNN_{represent}(\varvec{A}_g^{(l)},\varvec{H}_g^{(l)})\\&= ReLU(\widetilde{\varvec{D}}_{g}^{(l)^{-\frac{1}{2}}}\widetilde{\varvec{A}}_{g}^{(l)} \widetilde{\varvec{D}}_{g}^{(l)^{-\frac{1}{2}}}\varvec{H}_{g}^{(l-1)}\varvec{W}_{GNN}^{(l-1)}) \end{aligned} \end{aligned}$$
(12)
$$\begin{aligned} \varvec{S}_g^{(l)} = softmax(GNN_{pool}(\varvec{A}_g^{(l)},\varvec{H}_g^{(l)})) \end{aligned}$$
(13)

where \(\widetilde{\varvec{A}}_{g}^{(l)} = \varvec{A}_{g}^{(l)}+I\), \(\widetilde{\varvec{D}}_{g}^{(l)} = \sum _j \widetilde{\varvec{A}}_{ij}\), and \(\varvec{W}_{GNN}^{(l-1)}\) are learnable parameters.

After obtaining \(\varvec{Z}_g^{(l)}\) and \(\varvec{S}_g^{(l)}\), we can calculate the representation \(\varvec{H}_g^{(l+1)}\) and the adjacency matrix \(\varvec{A}_g^{(l+1)}\) for the \((l+1)\)th layer as follows:

$$\begin{aligned} \varvec{H}_g^{(l+1)} = {\varvec{S}_g^{(l)}}^T\varvec{Z_g}^{(l)}, \varvec{H}_g^{(l+1)}\in \mathbb {R}^{n_{l+1}\times d} \end{aligned}$$
(14)

where \(d\) is the number of columns in \(\varvec{Z}_g^{(l)}\), which is the feature dimension of nodes in the \(l\)th layer.

$$\begin{aligned} \varvec{A}_g^{(l+1)} = {\varvec{S}_g^{(l)}}^T\varvec{A}_g^{(l)}\varvec{S}_g^{(l)}, \varvec{A}_g^{(l+1)}\in \mathbb {R}^{n_{l+1}\times n_{l+1}} \end{aligned}$$
(15)

We use two layers of DiffPool to characterize subgraph behavior and finally obtain the subgraph-level behavior pattern representation \(\varvec{H}_g\), which serves as the output of the encoder.

Label prediction

Both the source domain and target domain use the methods mentioned in Sect. 4.2 to represent subgraphs as \(\varvec{H}_g^r, r\in \{s,t\}\). The semi-supervised learning classification module is designed to perform binary classification separately on the source and target domains, preparing for the subsequent domain adaptation module.

Specifically, we employ a multi-layer perceptron \(f_{pred}(\varvec{H};\varvec{\theta }_{pred})\), where \(\varvec{H}\) is the representations of all subgraphs, and \(\varvec{\theta }_{pred}\) represents the trainable parameters of the classifier. The predicted labels can be expressed as:

$$\begin{aligned} \widehat{\varvec{y}}^r = f_{pred}(\varvec{H}^r_g;\varvec{\theta }_{pred}), r\in \{s,t\} \end{aligned}$$
(16)

Subsequently, we use the cross-entropy loss function for the training of the classifier \(f_{pred}\):

$$\begin{aligned} \mathcal {L}_{pred} = -\frac{1}{n^s}\sum \limits ^{n^s}_{i=1} y^s_i log\widehat{y}^s_i \end{aligned}$$
(17)

Similarly, this loss function can also be computed on the target domain.

The specific iterative process of the address encoding encoder is as Fig. 7. Subgraphs’ \(\varvec{A}\), \(\varvec{F}_v\) and \(\varvec{F}_e\) serve as inputs to the LSTM, resulting in the representation \(\widetilde{\varvec{h}}\). After passing through two layers of GAT and two layers of DiffPool, the address representation \(\varvec{H}_g\) is obtained. Multi-layer perceptron (MLP) is employed for address representation classification. The original label set \(\varvec{Y}\) is used as the input to the loss function, which is then compared with the labels predicted by MLP to update the encoder’s parameters.

Adversarial domain adaptation

We use a adversarial domain adaptation module to eliminate the divergence between the Ethereum, Bitcoin, and EOSIO networks, facilitating knowledge transfer between these networks. For each subgraph in each network, we obtain subgraph representations \(\varvec{H}^r_g, r\in \{s,t\}\) through the encoder. To generate similar representations in the source and target domains, we use a fully connected layer as the domain discriminator, denoted as \(f_{disc}(\varvec{H}^r_g;\varvec{\theta }_{disc})\), with input \(\varvec{H}^r_g = f_{encod}[(\varvec{A}^r,\varvec{F}_v^r,\varvec{F}_e^r;\varvec{\theta }_{encod})]_g\), representing the representation of subgraph g, and \(\varvec{\theta }_{encod}\) as trainable parameters. The output is a real number indicating the similarity between the source and target domains.

Next, we let the generator \(f_{encod}\) and domain discriminator \(f_{disc}\) play against each other, making it impossible for the domain discriminator to distinguish the domain of the samples. Specifically, we first compute the optimal transportation distance also named Wasserstein distance (Arjovsky et al. 2017; Gulrajani et al. 2017) between the source and target domain distributions:

$$\begin{aligned} \begin{aligned} W_1(\mathbb {P}_{\varvec{H}^s},\mathbb {P}_{\varvec{H}^t}) =&\mathop {sup}_{\Vert f_{disc} \Vert _{L_c}\le 1} \mathbb {E}_{\mathbb {P}_{\varvec{H}^s}}[f_{disc}(\varvec{H};\varvec{\theta }_{disc})]\\&- \mathbb {E}_{\mathbb {P}_{\varvec{H}^t}}[f_{disc}(\varvec{H};\varvec{\theta }_{disc})] \end{aligned} \end{aligned}$$
(18)

where \(\Vert f_{disc} \Vert _{L_c}\le 1\) enforces the Lipschitz continuity condition on the domain discriminator to prevent gradient explosions or vanishing between the generator and domain discriminator, and sup represents the supremum. Furthermore, the optimal transportation distance maximizes the domain discriminator loss function under this condition, where the domain discriminator loss function is given by:

$$\begin{aligned} \mathcal {L}_{disc} = -\mathbb {E}_{\mathbb {P}_{\varvec{H}^s}}[f_{disc}(\varvec{H};\varvec{\theta }_{disc})] + \mathbb {E}_{\mathbb {P}_{\varvec{H}^t}}[f_{disc}(\varvec{H};\varvec{\theta }_{disc})] \end{aligned}$$
(19)

This loss encourages the domain discriminator to correctly classify the source and target domain representations while the generator aims to generate domain-invariant representations. The overall objective is to minimize \(\mathcal {L}_{disc}\) while maximizing \(W_1(\mathbb {P}_{\varvec{H}^s},\mathbb {P}_{\varvec{H}^t})\), which promotes domain adaptation and similarity between the source and target domain representations.

$$\begin{aligned} \begin{aligned} \mathcal {L}_{disc}&= \frac{1}{n^s}\sum \limits _{i=1}^{n^s}f_{disc}([f_{encod}(\varvec{A}^s,\varvec{F}_v^s,\varvec{F}_e^s;\varvec{\theta }_{encod})]_i;\varvec{\theta }_{disc})\\&\quad -\frac{1}{n^t}\sum \limits _{i=1}^{n^t}f_{disc}([f_{encod}(\varvec{A}^t,\varvec{F}_v^t,\varvec{F}_e^t;\varvec{\theta }_{encod})]_i;\varvec{\theta }_{disc}) \end{aligned} \end{aligned}$$
(20)

To ensure the Lipschitz continuity condition, a gradient penalty factor \(\mathcal {L}_{penal}\) is introduced to \(\theta _{disc}\):

$$\begin{aligned} \mathcal {L}_{penal}(\widehat{\varvec{H}}) = (\Vert \nabla _{\widehat{\varvec{H}}}f_{disc}(\widehat{\varvec{H}};\varvec{\theta }_{disc}) \Vert _2-1)^2 \end{aligned}$$
(21)

where the representation \(\widehat{\varvec{H}}\) refers to a random point along the line between the representations of the source and target domains, or the source or target domain itself.

Therefore, the subgraph representation is maintained constant by minimizing and maximizing the following:

$$\begin{aligned} \mathop {min}_{\varvec{\theta }_{encod}}\mathop {max}_{\varvec{\theta }_{disc}}\{\mathcal {L}_{disc}-\gamma \mathcal {L}_{penal}\} \end{aligned}$$
(22)

where \(\gamma\) is the gradient penalty coefficient, set to zero during the training of the generator. Generally, the parameters in the domain discriminator \(f_{disc}(\cdot )\) are trained to optimality before updating the generator \(f_{encod}(\cdot )\) parameters to minimize the optimal transport distance.

Model training

Expanding formula (22) and integrating it into the semi-supervised learning prediction loss function yields the final loss function:

$$\begin{aligned} \mathop {min}_{\varvec{\theta }_{encod},\varvec{\theta }_{pred}}\{\mathcal {L}_{pred}+\lambda \mathop {max}_{\varvec{\theta }_{disc}}[\mathcal {L}_{disc}-\gamma \mathcal {L}_{penal}]\} \end{aligned}$$
(23)

where \(\lambda\) is the balancing coefficient between semi-supervised learning and domain adaptation.

The training process is depicted in Algorithm 1.

Algorithm 1
figure a

Training algorithm for ADA-Spear

Experiments

In this section, the performance of the proposed method is assessed in comparison to current advanced methods through experiments. The analysis includes evaluating the efficiency and scalability of the method. Following that, it investigates diverse cross-blockchain-network phishing behavior patterns. Additionally, it assesses the effectiveness of different modules in the adversarial domain adaptation architecture and explores the impact of inter-chain distribution differences on the model.

Data preparation

In this subsection, the most popular two blockchain platforms and the largest Initial Coin Offering (ICO) platform are selected as the subjects of the experiment: Ethereum (Etherscan)(ETH), Bitcoin (Nakamoto 2008) (BTC), and EOSIO (EOSIO)(EOS). Transaction data from the Ethereum blockchain for the years 2019–2021, Bitcoin for 2019–2021, and EOSIO for 2018–2019 are extracted. From each chain, 1000 phishing nodes are randomly sampled, and to balance the training samples, the same number of benign nodes are also obtained. Subgraphs are constructed for each using the method described in Sect. 4.1. Detailed statistics of the dataset are shown in Table 2.

Table 2 Dataset statistics

For the three datasets, the reduced second-order subgraphs of phishing and benign nodes are used as the experimental input. The Ethereum dataset contains a total of 1,765,559 nodes and 4,319,271 edges, with the phishing nodes accounting for 0.06% of the total; the Bitcoin dataset includes 983,176 nodes and 4,859,188 edges, with phishing nodes making up 0.10%; the EOSIO dataset consists of 746,688 nodes and 9,727,013 edges, with phishing nodes comprising 0.13%. Due to EOSIO’s characteristic of rapidly recording interaction information, it presents the highest total number of edges and average degree despite having the fewest total nodes. However, the proportion of phishing nodes in EOSIO is comparable to the other datasets, which does not affect the subsequent experimental analysis.

To further assess the performance of ADA-Spear across these three domains, it is divided into six transfer learning tasks, which include: ETH \(\rightarrow\) BTC, EOS \(\rightarrow\) BTC, ETH \(\rightarrow\) EOS, BTC \(\rightarrow\) EOS, BTC \(\rightarrow\) ETH, and EOS \(\rightarrow\) ETH, where ETH, BTC, and EOS respectively represent the Ethereum dataset, the Bitcoin dataset, and the EOSIO dataset.

Experiment setup

This subsection primarily describes the baseline methods and implementation details.

Baselines

We select methods from different research approaches for comparative experiments, mainly divided into feature engineering, single-network learning, graph-based semi-supervised learning, and cross-network learning. The specifics are as follows:

Feature Engineering Inspired by Chen et al. (2020a), we select 219-dimensional features to characterize subgraph behavior for phishing behavior detection.

Single Network Learning We use DeepWalk (Perozzi et al. 2014), Graph2vec (Narayanan et al. 2017), Trans2vec (Wu et al. 2020), and T-Edge (Lin et al. 2020) as comparative methods for extracting subgraph representations. DeepWalk and Graph2vec can extract the structural information of subgraphs, while Trans2vec and T-Edge incorporate additional information such as transaction amounts and timing on top of structural information.

After obtaining subgraph (feature) representations using feature engineering and single network learning methods, logistic regression, random forests, and support vector machines are used for the subgraph classification task.

Graph-based Semi-supervised Learning We employ GCN (Kipf and Welling 2016), GraphSage (Hamilton et al. 2017), and MCGC (Zhang et al. 2021) as three deep learning methods, detecting phishing behavior in an end-to-end learning manner. GCN can integrate network structure and attribute information. GraphSAGE is derived from a variant of the GCN aggregation function. MCGC is a deep learning method that extracts subgraph information hierarchically. The attributes required for this class of methods are consistent with those proposed in this subsection.

Table 3 Comparison of F1 scores of ADA-Spear and other methods’ detection results, with optimal results within all methods indicated by bolded style and optimal results within each type indicated by wavy lines

Cross-Network Learning We use NetTr (Fang et al. 2013) and CDNE (Shen et al. 2020) as two transfer learning methods. NetTr transfers only network structural information. CDNE introduces a MMD loss function to perform domain adaptation learning in an autoencoder fashion. The attributes required for this class of methods are consistent with those proposed in this subsection.

Implementation details

This subsection conducts experiments on a Linux operating system with 128 GB of memory. NetworkX (2020) is used for graph data processing, PyTorch (Paszke et al. 2019) for model construction, and Scikit-learn (Pedregosa et al. 2011) for handling evaluation metrics.

To better compare the effectiveness of the methods, the dimensions of the subgraph representations used in this subsection are all the same, each with 128 dimensions. The encoder of the method proposed in the paper consists of 1 layer of LSTM, 2 layers of GAT, 2 layers of DiffPool, and 2 layers of MLP, with each layer using a 128-dimensional output for hidden layers. The dropout rate for hidden neurons is set to 0.4. The function \(f_{pred}(\cdot )\) is a multilayer perceptron, using a 128-dimensional output layer for label prediction. The domain discriminator \(f_{disc}(\cdot )\) has 2 layers with 128 neurons each, and the balance coefficient \(\lambda\), the gradient penalty coefficient \(\gamma\), and the number of training steps for the domain discriminator \(s_{disc}\) are set to 0.8, 10, and 15, respectively. The learning rates for the encoder and domain discriminator, \(\alpha _{encod}\) and \(\alpha _{disc}\), are both set to 0.001. The model is trained for 30 epochs.

For all non-cross-network learning methods, we merge the source and target networks into one network for experimentation. In the merged network, there are no edges between the source and target networks. Therefore, an 8:2 split is used as the training and test sets within each merged network, with fivefold cross validation used for experimentation. For single network learning methods, the walking length for DeepWalk, Trans2vec, and T-Edge is set to 10, and the context size is set to 4. The shift parameter \(\alpha\) in Trans2vec and T-Edge is set to 0.5. In Graph2vec, the number of training epochs is set to 30, with a learning rate of 0.001. For subsequent classifiers, the maximum number of iterations is set to 100 in logistic regression. The support vector machine uses an RBF kernel with hyperparameter \(\gamma\) set to 1000. In the random forest, the maximum depth is set to 7, with the number of base decision trees set to 100.

For graph-based semi-supervised learning methods, the GCN layers in GCN, GraphSage, and MCGC are set to 128 dimensions. The number of training epochs is set to 30, with a learning rate of 0.001. For MCGC, the number of aggregation layers is set to 3 layers.

For cross-network learning methods, NetTr and CDNE adopt the hyperparameters recommended in the literature.

Experimental results

This section primarily investigates the comparative effectiveness of the proposed method against current advanced methods. To ensure that the behavior patterns of the three blockchains are sufficiently similar to warrant transfer learning, the target domains in the experiments are divided into fully unlabeled and partially labeled (with a label rate of 5%). In this section, ADA-Spear’s detection effectiveness is verified to surpass current advanced methods across these three datasets and six transfer learning tasks. The main results are presented in terms of F1 scores, as shown in Table 3.

Firstly, from the table for the target domain with no labels, it can be seen that the proposed method ADA-Spear outperforms all comparison methods, demonstrating its effectiveness in cross-blockchain-network phishing behavior detection. Under the six cross-blockchain-network detection tasks, ADA-Spear’s F1 score is, on average, 7.1% higher than the best comparison method.

The F1 scores of feature engineering and single network learning methods are comparatively low, which aligns with expectations. Feature engineering methods can only depict certain types of phishing behaviors on a specific chain and struggle to comprehensively characterize phishing behaviors across different chains.

Fig. 8
figure 8

Impact of sampling range on time and cost (training time, node-to-edge ratio): a ETH \(\rightarrow\) BTC task; b BTC \(\rightarrow\) ETH task; c EOS \(\rightarrow\) BTC task; d BTC \(\rightarrow\) EOS task; e ETH \(\rightarrow\) EOS task; f EOS \(\rightarrow\) ETH task

Within single network learning methods, it’s evident that DeepWalk and Graph2vec, which only consider network structure, perform very poorly, even comparable to feature engineering methods. This can be attributed to the lack of interconnectivity between ETH, BTC, and EOS networks, resulting in incomparable representation vectors trained from the source and target domains. This is the reason for the subpar detection effectiveness. Moreover, because they do not incorporate any semantic characterization of on-chain phishing behavior, they cannot compare with Trans2vec and T-Edge, which introduce semantics. Semantic-aware detection methods outperform those considering only network structure by an average of 7.25% in F1 score, suggesting that phishing behaviors across heterogeneous chains share certain semantic similarities.

Graph-based semi-supervised learning methods show significant improvement over the previous two categories, with the MCGC method achieving the best results among them. These methods are, on average, 10.04% higher in F1 score compared to single network learning methods. This improvement can be attributed to the end-to-end learning mode of semi-supervised methods, which allows for the adjustment of subgraph behavior representation while classifying, rather than post-representation classification as with the previous two unsupervised learning approaches. MCGC achieves the best results because it overcomes the flattening issue of GCN-based methods, considering subgraph representation from a hierarchical perspective, and portraying behaviors more completely and accurately at the subgraph level.

The cross-network learning methods NetTr and CDNE are the most effective among all comparison methods but still have a significant gap compared to the detection effectiveness of the proposed method in this paper. ADA-Spear’s F1 score exceeds the average of cross-network learning methods by 7.1%. Especially NetTr did not achieve the expected detection performance. This may be due to NetTr only transferring the topological structure between the source and target domains, not considering the semantic information of behaviors, which also indirectly proves that phishing behaviors on the three different chains have significant topological drift. The substantial improvement in the detection effectiveness of ADA-Spear is mainly due to the integration of more semantic information on phishing behavior, hierarchical stereoscopic behavior characterization, and the loss function in adversarial domain adaptation being more effective than the MMD loss function.

From these six transfer learning tasks, it is observed that transfers to EOS are more challenging, which indirectly suggests that the behavior patterns of nodes on EOS differ significantly from those on other chains. However, the detection results are still at a high level, which indicates that although there are distribution differences in behavior, the method proposed in this paper can still mitigate distribution drift and achieve good detection results.

Comparing the tables for target domains with and without labels shows that introducing target domain labels improves the detection performance of all models, with many phenomena similar to those observed in the absence of labels. While detection performance improves with the introduction of labels, the increase is not substantial, which also demonstrates the robustness of the model. Furthermore, it indicates that phishing behaviors across these three chains possess certain similarities and that the distributions have consistency. This validates the meaningfulness of using domain adaptation methods.

Efficiency analysis

This section conducts an efficiency analysis. Firstly, an analysis of the relationship between time and cost across different sampling ranges was carried out, with the results shown in Fig. 8. This subsection uses the ratio of the number of nodes and edges to the total number of nodes and edges as a cost indicator for analysis. Since the task duration remains the same when the datasets used in the source and target domains of transfer learning are swapped, so nodes and edges increasing are showing the same trend in the tasks such as ETH-BTC: ETH \(\rightarrow\) BTC and BTC \(\rightarrow\) ETH but time cost between the tasks have slight fluctuation. It can be observed from the figure that the time increases with the number of sampled nodes, and the increase tends to be linear. Since graph data needs to be read, the ratio of nodes and edges represents the memory usage rate, which, as shown in the figure, increases linearly with the number of sampled nodes. Therefore, the method proposed in this paper tends towards linearity in both time and cost aspects, indicating that ADA-Spear is suitable for large-scale networks and has good scalability.

Fig. 9
figure 9

Impact of sampling range on detection results: a ETH \(\rightarrow\) BTC task; b BTC \(\rightarrow\) ETH task; c EOS \(\rightarrow\) BTC task; d BTC \(\rightarrow\) EOS task; e ETH \(\rightarrow\) EOS task; f EOS \(\rightarrow\) ETH task

Secondly, this section also compares the impact of the sampling range on the F1 score for ADA-Spear with two other methods, with results shown in Fig. 9. The other two methods selected, GCN and CDNE, were chosen because they achieved the optimal F1 scores among the comparison methods. As can be seen from the figure, the F1 scores for all six tasks are generally optimized when K = 25; therefore, K = 25 was chosen for experimentation. Additionally, it is evident from the figure that the F1 score for ADA-Spear consistently outperforms that of GCN and CDNE. The detection effect is not ideal before K reaches 20, but there is a significant improvement after K exceeds 20. However, there is a slight decline when K reaches 30. This indicates that the neighboring nodes have the maximum amount of information when K is between 20 and 25, and beyond 30, the redundant information becomes detrimental to the model’s learning.

Table 4 Impact of the adversarial domain adaptation module on detection performance

In summary, the method proposed in this section has the best efficiency in balancing time and detection effectiveness, surpassing the other methods.

Ablation experiment

This section investigates the impact of the adversarial domain adaptation module and the encoder module on the overall model’s detection performance and conducts a visual analysis.

Impact of the adversarial domain adaptation module

To explore the effect of this module on the overall detection performance, the subsection conducts experiments without this module, and the comparative results are presented in Table 4. As can be seen from the table, the adversarial domain adaptation module mitigates domain discrepancies and enhances detection performance. The absence of this module would lead to a significant distributional shift, whereas ADA-Spear can make the subgraph representations have clearer class boundaries. This demonstrates that the adversarial domain adaptation module can effectively alleviate the distribution drift between chains, making a substantial contribution to the detection of phishing activities on new blockchains.

Table 5 Impact of the encoder network on detection performance

Impact of the encoder network

To explore whether the encoder network proposed in this paper accurately captures the distinctive characteristics of phishing and benign behaviors, this section replaces the proposed encoder network with a multilayer perceptron. This perceptron utilizes a fully connected approach for feature extraction. The comparative results are shown in Table 5. As can be seen from the table, the implementation of the encoder designed in this paper leads to improvements in all six cross-blockchain-network phishing detection tasks. The averages of Rc, Pr, and F1 increased by 2.85%, 2.81%, and 2.83%, respectively. This demonstrates that the encoder can effectively delineate the distinctive features between phishing and benign behaviors, making it an indispensable part of the model.

Fig. 10
figure 10

Comparison chart of detection efficacy with different overlap rates of attributes between source and target domains: a ETH \(\rightarrow\) BTC; b EOS \(\rightarrow\) BTC; c ETH \(\rightarrow\) EOS; d BTC \(\rightarrow\) EOS; e EOS \(\rightarrow\) ETH; f BTC \(\rightarrow\) ETH

Distribution difference analysis

This section discusses the differences in distributions between the source chain and the target chain. Under six cross-blockchain-network phishing detection tasks, the impact of changes in the distribution differences on the detection results is explored by varying the feature overlap degree between the source and target domains. The feature overlap degree is defined as \(C = \frac{|F^s \cap F^t|}{|F^s \cup F^t|}\), where \(F^r\) (with \(r \in \{s, t\}\)) represents the features in domain \(r\). This is achieved by randomly removing certain attributes, causing \(C\) to vary from 10% to 50%. The final results are shown in Fig. 10. The best methods of semi-supervised learning and cross-network learning are selected for comparison with the proposed method. As seen in the figure, ADA-Spear consistently outperforms GCN and CDNE across all label rates in all tasks. This also indicates that, even with only a small portion of overlapping attributes between two domains, adversarial domain adaptation techniques still make a significant contribution to the model. This adequately demonstrates the robustness of the method proposed in this paper, making it capable of detecting phishing behaviors across an even wider range of new chains.

Fig. 11
figure 11

ADA-Spear parameter sensitivity analysis: a LSTM sequence length; b training steps; c penalty factor; d balance coefficient

Sensitivity analysis

This section conducts a parameter sensitivity analysis of ADA-Spear to explore the impact of hyperparameters on the model. The sensitivity of the LSTM length \(m\), the training steps of the domain discriminator \(s_{disc}\), the penalty factor \(\gamma\), and the balance coefficient \(\lambda\) are analyzed. Since the trends in hyperparameter changes are similar across various tasks, this section presents the F1 values only for the ETH \(\rightarrow\) BTC task to avoid repetition. The method of controlling variables is used here; when studying a single hyperparameter, the others are kept constant as described in Sect. 5.2.

LSTM Length \(m\) The length of LSTM is used to receive subgraph feature inputs of different total time steps. As shown in Fig. 11a, subgraphs with a time span of more than 30 days have achieved good and stable detection results. The detection results show stability when LSTM encompasses information over more days, demonstrating the robustness of the model. When the length is 10, the detection performance is lower, indicating that subgraphs should ideally not be chosen with less than 10 steps. The stable performance in the graph also proves that using LSTM of variable lengths for detection is feasible.

Domain Discriminator Training Steps \(s_{disc}\) As observed in Fig. 11b, there is a clear increase in the F1 value when \(s_{disc}\) changes from 5 to 10, followed by a tendency to stabilize. This confirms the optimization theory of the domain discriminator. Since the parameters of other components in the model remain unchanged during the training of the domain discriminator, as long as the number of training steps for the domain discriminator is sufficiently large, it can reach the optimal solution.

Penalty Factor \(\gamma\) The penalty factor is used to adjust various hyperparameters of the domain discriminator. As can be seen from Fig. 11c, the optimal detection performance is achieved when \(\gamma = 10\). Both excessively high and low values lead to model degradation. Therefore, this paper adopts a penalty factor of 10 for the experiments.

Balance Coefficient \(\lambda\) The balance coefficient is used to adjust the balance between adversarial domain adaptation learning and semi-supervised learning. As shown in Fig. 11d, the detection results improve when \(\lambda\) varies between 0.4 and 1.0. There is a sharp decline in detection performance after \(\lambda = 1.0\). Therefore, the chosen \(\lambda\) for the model should be between 0.4 and 1.0 to balance the learning of distinguishability between different categories and the similarity between domains.

Conclusion

This paper addresses the detection of cross-blockchain-network phishing activities by combining an encoder that effectively characterizes phishing behaviors with ADA-Spear’s adversarial domain adaptation module. The encoder module combines temporal and topological information to create a hierarchical subgraph representation. Simultaneously, the adversarial domain adaptation module facilitates knowledge transfer from the source domain to the target domain. This combination enables ADA-Spear to be effectively applied to new chains for recognizing phishing behavior. Detailed experiments, using Ethereum, Bitcoin, and EOSIO as examples, further demonstrate ADA-Spear’s advantages in accuracy and robustness. Meanwhile, ADA-Spear exhibits certain limitations.The precision of ADA-Spear demonstrates a considerable improvement over existing methods; however, there is still room for further enhancement until it can rival the detection performance achieved solely within a single chain. Additionally, ADA-Spear may encounter limitations in knowledge transfer in cases where there is significant disparity between the two chains. Research on generalizable phishing recognition methods across different chains is still in its early stages. This paper introduces one potential approach, offering a new research perspective to the community.

Availability of data and materials

The datasets using in this paper can be seen in https://drive.google.com/drive/folders/1xoplZg0vOBKF9Hw1aHNBD-KTpK0YW_P0?usp=sharing.

References

  • Aggarwal CC et al (2015) Data mining: the textbook, vol 1

  • Ao X, Liu Y, Qin Z, Sun Y, He Q (2021) Temporal high-order proximity aware behavior analysis on Ethereum. World Wide Web 24:1–21

    Article  Google Scholar 

  • Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: International conference on machine learning. PMLR, pp 214–223

  • Chainanalysis: The 2022 Crypto Crime Report. https://go.chainalysis.com/rs/503-FAP-074/images/Crypto-Crime-Report-2022.pdf

  • Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020a) Phishing scams detection in Ethereum transaction network. ACM Trans Internet Technol (TOIT) 21(1):1–16

    Article  Google Scholar 

  • Chen T, Li Z, Zhu Y, Chen J, Luo X, Lui JC-S, Lin X, Zhang X (2020b) Understanding Ethereum via graph analysis. ACM Trans Internet Technol (TOIT) 20(2):1–32

    Article  Google Scholar 

  • CNVD-BC: blockchain security situation perception report. https://bc.cnvd.org.cn/notice_info?num=0c4088bbb6f7346000c3ac1ce13f0347

  • CoinMarketCap: CoinMarketCap. https://coinmarketcap.com/

  • Dai Q, Li Q, Tang J, Wang D (2018) Adversarial network embedding. In: Proceedings of the AAAI conference on artificial intelligence, vol 32

  • Dai Q, Shen X, Zhang L, Li Q, Wang D (2019) Adversarial training methods for network embedding. In: The world wide web conference, pp 329–339

  • EOSIO: EOSIO. https://eos.io/

  • Etherscan: Etherscan. https://etherscan.io

  • Etherscan: explore navigate Etherescan’s label world cloud. https://etherscan.io/labelcloud

  • Fang M, Yin J, Zhu X (2013) Transfer learning across networks for collective classification. In: 2013 IEEE 13th international conference on data mining. IEEE, pp 161–170

  • Ganin Y, Lempitsky V (2015) Unsupervised domain adaptation by backpropagation. In: International conference on machine learning. PMLR, pp 1180–1189

  • Ganin Y, Ustinova E, Ajakan H, Germain P, Larochelle H, Laviolette F, March M, Lempitsky V (2016) Domain-adversarial training of neural networks. J Mach Learn Res 17(59):1–35

    MathSciNet  Google Scholar 

  • Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative adversarial networks. Commun ACM 63(11):139–144

    Article  MathSciNet  Google Scholar 

  • Gouk H, Frank E, Pfahringer B, Cree MJ (2021) Regularisation of neural networks by enforcing lipschitz continuity. Mach Learn 110:393–416

    Article  MathSciNet  Google Scholar 

  • Grover A, Leskovec J (2016) node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 855–864

  • Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. Adv Neural Inf Process Syst 30

  • Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inf Process Syst 30

  • Heimann M, Koutra D (2017) On generalizing neural node embedding methods to multi-network problems. In: KDD MLG workshop

  • Jain AK, Gupta BB et al (2017) Phishing detection: analysis of visual similarity based approaches. Secur Commun Netw 2017

  • Ji S, Pan S, Cambria E, Marttinen P, Philip SY (2021) A survey on knowledge graphs: representation, acquisition, and applications. IEEE Trans Neural Netw Learn Syst 33(2):494–514

    Article  MathSciNet  Google Scholar 

  • Jiao P, Guo X, Jing X, He D, Wu H, Pan S, Gong M, Wang W (2021) Temporal network embedding for link prediction via VAE joint attention mechanism. IEEE Trans Neural Netw Learn Syst 33(12):7400–7413

    Article  Google Scholar 

  • Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE international conference on data mining workshops (ICDMW). IEEE, pp 55–62

  • Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:1609.02907

  • Li Y, Cai Y, Tian H, Xue G, Zheng Z (2020) Identifying illicit addresses in bitcoin network. In: Blockchain and trustworthy systems: second international conference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised Selected Papers 2. Springer, pp 99–111

  • Li S, Gou G, Liu C, Hou C, Li Z, Xiong G (2022) Ttagn: Temporal transaction aggregation graph network for Ethereum phishing scams detection. In: Proceedings of the ACM web conference 2022, pp 661–669

  • Lin D, Wu J, Yuan Q, Zheng Z (2020) T-edge: temporal weighted multidigraph embedding for Ethereum transaction network analysis. Front Phys 8:204

    Article  Google Scholar 

  • Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review

  • Narayanan A, Chandramohan M, Venkatesan R, Chen L, Liu Y, Jaiswal S (2017) graph2vec: learning distributed representations of graphs. arXiv:1707.05005

  • NetworkX D (2020) Networkx: network analysis in python

  • Ni J, Chang S, Liu X, Cheng W, Chen H, Xu D, Zhang X (2018) Co-regularized deep multi-network embedding. In: Proceedings of the 2018 world wide web conference, pp 469–478

  • Orunsolu AA, Sodiya AS, Akinwale A (2022) A predictive model for phishing detection. J King Saud Univ-Comput Inf Sci 34(2):232–247

    Google Scholar 

  • Pan SJ, Yang Q (2009) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345–1359

    Article  Google Scholar 

  • Pan S, Hu R, Long G, Jiang J, Yao L, Zhang C (2018) Adversarially regularized graph autoencoder for graph embedding. arXiv:1802.04407

  • Pan S, Hu R, Fung S-F, Long G, Jiang J, Zhang C (2019) Learning graph embedding with adversarial training methods. IEEE Trans Cybern 50(6):2475–2487

    Article  Google Scholar 

  • Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L et al (2019) Pytorch: an imperative style, high-performance deep learning library. Adv Neural Inf Process Syst 32:8024–8035

    Google Scholar 

  • Patel V, Pan L, Rajasegarar S (2020) Graph deep learning based anomaly detection in Ethereum blockchain network. In: Network and system security: 14th international conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings 14. Springer, pp 132–148

  • Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830

    MathSciNet  Google Scholar 

  • Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 701–710

  • Sayadi S, Rejeb SB, Choukair Z (2019) Anomaly detection model over blockchain electronic transactions. In: 2019 15th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 895–900

  • Shen J, Qu Y, Zhang W, Yu Y (2018) Wasserstein distance guided representation learning for domain adaptation. In: Proceedings of the AAAI conference on artificial intelligence, vol 32

  • Shen X, Dai Q, Mao S, Chung F-L, Choi K-S (2020) Network together: node classification via cross-network deep network embedding. IEEE Trans Neural Netw Learn Syst 32(5):1935–1948

    Article  MathSciNet  Google Scholar 

  • Singh A (2019) Anomaly detection in the Ethereum network. A thesis for the degree of Master of Technology/Indian Institute of Technology Kanpur

  • SlowMist: 2022 blockchain security and AML analysis annual report. https://www.slowmist.com/report/2022-Blockchain-Security-and-AML-Analysis-Annual-Report(CN).pdf

  • Toyoda K, Ohtsuki T, Mathiopoulos PT (2018) Multi-class bitcoin-enabled service identification based on transaction history summarization. In: 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE, pp 1153–1160

  • Wang D, Cui P, Zhu W (2016) Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 1225–1234

  • Wang X, Cui P, Wang J, Pei J, Zhu W, Yang S (2017) Community preserving network embedding. In: Proceedings of the AAAI conference on artificial intelligence, vol 31

  • Wiles O, Gowal S, Stimberg F, Alvise-Rebuffi S, Ktena I, Dvijotham K, Cemgil T (2021) A fine-grained analysis on distribution shift. arXiv:2110.11328

  • Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? Phishing scam detection on Ethereum via network embedding. IEEE Trans Syst Man Cybern Syst 52(2):1156–1166

    Article  Google Scholar 

  • Xu L, Wei X, Cao J, Yu PS (2017) Embedding of embedding (EOE) joint embedding for coupled heterogeneous networks. In: Proceedings of the tenth ACM international conference on web search and data mining, pp 741–749

  • Xu L, Wei X, Cao J, Yu PS (2018) On exploring semantic meanings of links for embedding social networks. In: Proceedings of the 2018 world wide web conference, pp 479–488

  • Yang Z, Cohen W, Salakhudinov R (2016) Revisiting semi-supervised learning with graph embeddings. In: International conference on machine learning. PMLR, pp 40–48

  • Ying Z, You J, Morris C, Ren X, Hamilton W, Leskovec J (2018) Hierarchical graph representation learning with differentiable pooling. Adv Neural Inf Process Syst 31

  • Yuan Q, Huang B, Zhang J, Wu J, Zhang H, Zhang X (2020) Detecting phishing scams on Ethereum based on transaction records. In: 2020 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1–5

  • Zhang D, Chen J, Lu X (2021) Blockchain phishing scam detection via multi-channel graph classification. In: Blockchain and trustworthy systems: third international conference, BlockSys 2021, Guangzhou, China, August 5–6, 2021, Revised Selected Papers 3. Springer, pp 241–256

  • Zheng H, Ma M, Ma H, Chen J, Xiong H, Yang Z (2023) Tegdetector: a phishing detector that knows evolving transaction behaviors. IEEE Trans Comput Soc Syst

  • Zuraiq AA, Alkasassbeh M (2019) Phishing detection approaches. In: 2019 2nd international conference on new trends in computing sciences (ICTCS). IEEE, pp 1–6

Download references

Acknowledgements

We are deeply grateful to the blind peer reviewers for their valuable suggestions and feedback on our paper. Their contributions have significantly enhanced the quality of our research. We would also like to extend our gratitude to all those who have provided assistance and support throughout the development of this paper.

Funding

This research is supported by National Key Research and Development Program of China (Nos. 2023YFC3306305, 2021YFF0307203, 2019QY1300), Foundation Strengthening Program Technical Area Fund (No.2021-JCJQ-JJ-0908), technological project funding of the State Grid Corporation of China (Contract Number: SG270000YXJS2311060), Youth Innovation Promotion Association CAS (No. 2021156), the Strategic Priority Research Program of Chinese Academy of Sciences (No. XDC02040100) and National Natural Science Foundation of China (No. 61802404). This work is also supported by the Program of Key Laboratory of Network Assessment Technology, the Chinese Academy of Sciences, Program of Beijing Key Laboratory of Network Security and Protection Technology.

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributed to this manuscript and approve of this submission. CY participated in all the work and drafting the article. XH participated in the drafting the article. YZ did some basic collection work. Prof. YL, ZL, and Dr. DD made a decisive contribution to the content of research and revising the article critically.

Corresponding author

Correspondence to Dan Du.

Ethics declarations

Competing interests

The authors declare that they have no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, C., Han, X., Zhu, Y. et al. Phishing behavior detection on different blockchains via adversarial domain adaptation. Cybersecurity 7, 45 (2024). https://doi.org/10.1186/s42400-024-00237-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s42400-024-00237-5

Keywords