Implementation of Deep Neural Network in the Design of Ethereum Blockchain Scam Token Detection Applications

Dimas Arya Pamungkas, Ivana Lucia Kharisma, Dwi Sartika Simatupang, Kamdan Kamdan

Abstract


The popularity of blockchain continues to increase as technology develops, especially in the context of Ethereum as one of the leading blockchain platforms. However, this increase was also followed by many cases of fraud, especially in the form of tokens. In blockchain technology, tokens often refer to cryptocurrencies or digital currencies used as a means of exchange related to a particular project or platform. This research designs and builds an application system that can detect scam crypto tokens on the Ethereum blockchain, specifically for the ERC-20 (Ethereum Request for Comments 20) token type, which was proposed by Fabian Vogelsteller in November 2015, is a token standard that implements APIs for tokens. in Smart Contracts. Making a scam detection application implements the deep learning method with the Deep Neural Network (DNN) algorithm and evaluates performance using two test scenarios by dividing the dataset into three ratios of training data and test data. The output of the application is JSON-RPC which is integrated with the website. In testing the DNN model, using 80% training data and 20% test data, the DNN algorithm provides an accuracy of 0.997558%. Furthermore, system testing was carried out involving various scenarios to verify its functionality, including input validation, data extraction, DNN prediction, and display of prediction results, which gave good results from the system created. The application has succeeded in identifying scam tokens with high accuracy. , increasing user security in crypto transactions.

Full Text:

PDF

References


R. M. Jaya, V. D. Rakkhitta, P. Sembiring, I. S. Edbert, and D. Suhartono, “Blockchain applications in drug data records,” Procedia Comput. Sci., vol. 216, pp. 739–748, 2023, doi: 10.1016/j.procs.2022.12.191.

N. F. Samreen and M. H. Alalfi, “An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps),” Blockchain Res. Appl., vol. 4, no. 2, 2023, doi: 10.1016/j.bcra.2022.100120.

F. T. Commission, “Remarks of Chair Lina M. Khan Regarding the 6(b) Orders Concerning Deceptive Advertising on Social Media - March 16, 2022,” 2022.

K. Toyoda, P. Takis Mathiopoulos, and T. Ohtsuki, “A Novel Methodology for HYIP Operators’ Bitcoin Addresses Identification,” IEEE Access, vol. 7, pp. 74835–74848, 2019, doi: 10.1109/ACCESS.2019.2921087.

E. Badawi, G. Jourdan, and I. Onut, “Blockchain : Research and Applications The ‘ Bitcoin Generator ’ Scam,” Blockchain Res. Appl., vol. 3, no. 3, p. 100084, 2022, [Online]. Available: https://doi.org/10.1016/j.bcra.2022.100084.

R. K. Sachan, R. Agarwal, and S. K. Shukla, “Identifying malicious accounts in blockchains using domain names and associated temporal properties,” Blockchain Res. Appl., p. 100136, 2023, doi: 10.1016/j.bcra.2023.100136.

W. Cui and C. Gao, “WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies,” Blockchain Res. Appl., vol. 4, no. 1, p. 100108, 2023, doi: 10.1016/j.bcra.2022.100108.

S. Farrugia, J. Ellul, and G. Azzopardi, “Detection of illicit accounts over the Ethereum blockchain,” Expert Syst. Appl., vol. 150, p. 113318, 2020, doi: 10.1016/j.eswa.2020.113318.

Yugesh Verma, “A Complete Guide to Categorical Data Encoding,” 2021. https://analyticsindiamag.com/a-complete-guide-to-categorical-data-encoding/ (accessed Jul. 21, 2023).

S. Kohli, “Understanding a Classification Report For Your Machine Learning Model,” https://medium.com/, 2019. https://medium.com/@kohlishivam5522/understanding-a-classification-report-for-your-machine-learning-model-88815e2ce397.

P. Palinggik Allorerung, J. K. Perintis Kemerdekaan, K. Tamalanrea, K. Makassar, and S. Selatan, “SISTEMASI: Jurnal Sistem Informasi Analisis Sentimen Pada Ulasan Aplikasi WeTV di Google Play Store Menggunakan Algoritma NBC dan SVM Sentiment Analysis on WeTV App Reviews on Google Play Store Using NBC and SVM Algorithms,” vol. 12, no. 2, pp. 2540–9719, 2023, [Online]. Available: http://sistemasi.ftik.unisi.ac.id.

C. Yuan, J. Du, M. Yue, and T. Ma, “The design of large scale IP address and port scanning tool,” Sensors (Switzerland), vol. 20, no. 16, pp. 1–12, 2020, doi: 10.3390/s20164423.

S. SHARMA, “Activation Functions in Neural Networks Sigmoid, tanh, Softmax, ReLU, Leaky ReLU EXPLAINED !!!,” https://towardsdatascience.com, 2017. https://towardsdatascience.com/activation-functions-neural-networks-1cbd9f8d91d6.

X. Ying, “An Overview of Overfitting and its Solutions,” J. Phys. Conf. Ser., vol. 1168, no. 2, 2019, doi: 10.1088/1742-6596/1168/2/022022.

M. R. Iswardhana and S. Widiono, Diplomasi Siber dan Teknologi Mobile Pada Multi disiplin. 2021.




DOI: https://doi.org/10.32520/stmsi.v12i3.3162

Article Metrics

Abstract view : 315 times
PDF - 95 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.