Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2022, Vol. 16 Issue (4) : 164505    https://doi.org/10.1007/s11704-021-0221-3
RESEARCH ARTICLE
Demystifying Ethereum account diversity: observations, models and analysis
Chaofan WANG1,2, Xiaohai DAI1,2, Jiang XIAO1,2(), Chenchen LI1,2, Ming WEN1,3, Bingbing ZHOU4, Hai JIN1,2
1. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab, Clusters and Grid Computing Lab, Wuhan 430074, China
2. School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
3. School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
4. Centre for Distributed and High Performance Computing, School of Information Technologies, The University of Sydney, New South Wales 2006, Australia
 Download: PDF(16932 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart contracts. These massive accounts can be divided into diverse categories, such as miners, tokens, and exchanges, which is termed as account diversity in this paper. The benefit of investigating diversity are multi-fold, including understanding the Ethereum ecosystem deeper and opening the possibility of tracking certain abnormal activities. Unfortunately, the exploration of blockchain account diversity remains scarce. Even the most relevant studies, which focus on the deanonymization of the accounts on Bitcoin, can hardly be applied on Ethereum since their underlying protocols and user idioms are different. To this end, we present the first attempt to demystify the account diversity on Ethereum. The key observation is that different accounts exhibit diverse behavior patterns, leading us to propose the heuristics for classification as the premise. We then raise the coverage rate of classification by the statistical learning model Maximum Likelihood Estimation (MLE). We collect real-world data through extensive efforts to evaluate our proposed method and show its effectiveness. Furthermore, we make an in-depth analysis of the dynamic evolution of the Ethereum ecosystem and uncover the abnormal arbitrage actions. As for the former, we validate two sweeping statements reliably: (1) standalone miners are gradually replaced by the mining pools and cooperative miners; (2) transactions related to the mining pool and exchanges take up a large share of the total transactions. The latter analysis shows that there are a large number of arbitrage transactions transferring the coins from one exchange to another to make a price difference.

Keywords blockchain      Ethereum      classification      account diversity      network analysis     
Corresponding Author(s): Jiang XIAO   
Just Accepted Date: 26 January 2021   Issue Date: 01 December 2021
 Cite this article:   
Chaofan WANG,Xiaohai DAI,Jiang XIAO, et al. Demystifying Ethereum account diversity: observations, models and analysis[J]. Front. Comput. Sci., 2022, 16(4): 164505.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-021-0221-3
https://academic.hep.com.cn/fcs/EN/Y2022/V16/I4/164505
Fig.1  An overview of our approach
Functionality Categories Descriptions
Mining Related S-miners Solve the PoW problem and receive mining rewards independently
Pools Collect the registrants’ computing power and divide the rewards
Co-miners Register on a mining pool and receive the mining dividends
Service Provider ERC20-tokens Issue tokens and follow ERC20 token standard
Exchanges Serve as the mediation to exchange ethers/tokens for fiat money
Gamblings Provide gambling service on the Ethereum
Oracles Serve as data feeder for Ethereum
Others Other accounts without typical behavior pattern
Tab.1  Categories of accounts on Ethereum
Class Feature Parameter
Degree Large degree Tt=0.01
Balanced degree di?do <=2
Value Large value Tl=500Eth
Small value Ts=1wei
Many decimals pdˉ>=8
Interval Fixed interval σt/tˉ<=0.05
Short interval Tw=6
Intensive initiation n1/nk>0.5; Tn=50
Data Data content dasf=a9059cbb
Data size Ti=128
Similarity ld<0.05
Tab.2  Detailed parameters taken to quantify features
Fig.2  Simple case of MLE-based classification. (a) Heuristic Results; (b) Probability matrices; (c) MLE Results
Fig.3  Normal case of MLE-based classification. (a) Insufficient information; (b) Sufficient information
Fig.4  Two stages of heuristics
Fig.5  Validation results with different methods. (a) Coverage rate; (b) Accuracy rate; (c) F1 score
Fig.6  Variance of accounts and transactions over time
Fig.7  Change of ether price and mining difficulty
Fig.8  Number change of different categories over time. (a) With co-miners; (b) Without co-miners
Fig.9  Ratio change of transactions related to different categories over time
Fig.10  Sketch map of arbitrage activities
Fig.11  Disguise actions. (a) Multi-hop pattern; (b) Splitting pattern
Fig.12  Arbitrage actions among different exchanges
1 Buterin V. A next-generation smart contract and decentralized application platform. White Paper, 2014, 3(37)
2 Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 2008: 2120
3 Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1−32
4 Anzai Y. Pattern recognition and machine learning. Journal of Electronic Imaging, 2007, 16(4): 99−101
5 Y Li , B Liu . A normalized Levenshtein distance metric. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29( 6): 1091– 1095
6 Ron D, Shamir A. Quantitative analysis of the full Bitcoin transaction graph. In: Proceedings of the 2013 International Conference on Financial Cryptography and Data Security. 2013, 6−24
7 Androulaki E, Karame G O, Roeschlin M, Scherer T, Capkun S. Evaluating user privacy in Bitcoin. In: Proceedings of the 2013 International Conference on Financial Cryptography and Data Security. 2013, 34−51
8 Athey S, Parashkevov I, Sarukkai V, Xia J. Bitcoin pricing, adoption, and usage: theory and evidence. Stanford University Graduate School of Business, 2016: 16−42
9 Victor F. Address clustering heuristics for ethereum. In: Proceedings of the 24th International Conference on Financial Cryptography and Data Security. 2020, 617−633
10 Wang M J, Ichijo H, Xiao B. Cryptocurrency address clustering and labeling. 2020, arXiv: 2003.13399
11 Sun H Y, Ruan N, Liu H Q. Ethereum analysis via node clustering. In: Proceedings of International Conference on Network and System Security. 2019, 114−129
12 Norvill R, Fiz B, State R, Cullen A. Automated labeling of unknown contracts in Ethereum. In: Proceedings of the 26th International Conference on Computer Communication and Networks. 2017, 1−6
13 Jourdan M, Blandin S, Wynter L, Deshpande P. Characterizing entities in the Bitcoin blockchain. In: Proceedings of 2018 IEEE International Conference on Data Mining Workshops. 2018, 55−62
14 Jourdan M, Blandin S, Wynter L, Deshpande P. A probabilistic model of the Bitcoin blockchain. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. 2019, 2784−2792
15 Fröwis M, Fuchs A, Böhme R. Detecting token systems on ethereum. In: Proceedings of the 23th International Conference on Financial Cryptography and Data Security. 2019, 93−112
16 Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhang X. Understanding ethereum via graph analysis. In: Proceedings of IEEE International Conference on Computer Communications. 2018, 1484−1492
17 Chen T, Li Z, Zhang Y, Luo X, Chen A, Yang K, Hu B, Zhu T, Deng S, Hu T. Dataether: Data exploration framework for ethereum. In: Proceedings of the 39th International Conference on Distributed Computing Systems. 2019, 1369−1380
18 D C Guo , J Q Dong , K Wang . Graph structure and statistical properties of ethereum transaction relationships. Science China Information Sciences, 2019, 492( 1): 58– 71
19 He N, Wu L, Wang H, Guo Y, Jiang X. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. 2019, arXiv: 1905.00272
20 Kiffer L, Levin D, Mislove A. Analyzing Ethereum’s Contract Topology. In: Proceedings of the Internet Measurement Conference. 2018, 494−499
21 Norvill R, Fiz B, State R, Cullen A. Standardising smart contracts: Automatically inferring ERC standards. In: Proceedings of International Conference on Blockchain and Cryptocurrency. 2019, 192−195
22 B Massimo , C Salvatore , C Tiziana , S Roberto . Dissecting ponzi schemes on ethereum: Identification, analysis, and impact. Future Generation Computer Systems, 2020, 102( 1): 259– 277
23 Chen W, Wu J, Zheng Z, Chen C, Zhou Y. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference. 2018, 1409−1418
24 Christof F T, Mathis S, Radu S. The art of the scam: demystifying honeypots in Ethereum smart contracts. In: Proceedings of the 28th USENIX Security Symposium. 2019, 1591−1607
25 Ramiro C, Christof F T, Mathis B, Radu S. A data science approach for honeypot detection in ethereum. In: Proceedings of IEEE International Conference on Blockchain and Cryptocurrency. 2020, 1−9
26 Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020: 1−11
27 Chen W, Wu J, Zheng Z, Chen C, Zhou Y. Market manipulation of Bitcoin: evidence from mining the Mt. Gox transaction network. In: Proceedings of IEEE Conference on Computer Communications. 2019, 964−972
[1] Zhe XUE, Junping DU, Xin XU, Xiangbin LIU, Junfu WANG, Feifei KOU. Few-shot node classification via local adaptive discriminant structure learning[J]. Front. Comput. Sci., 2023, 17(2): 172316-.
[2] Peng LI, Junzuo LAI, Yongdong WU. Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing[J]. Front. Comput. Sci., 2023, 17(1): 171802-.
[3] Xinyu TONG, Ziao YU, Xiaohua TIAN, Houdong GE, Xinbing WANG. Improving accuracy of automatic optical inspection with machine learning[J]. Front. Comput. Sci., 2022, 16(1): 161310-.
[4] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[5] Panthadeep BHATTACHARJEE, Pinaki MITRA. A survey of density based clustering algorithms[J]. Front. Comput. Sci., 2021, 15(1): 151308-.
[6] Yunyun WANG, Jiao HAN, Yating SHEN, Hui XUE. Pointwise manifold regularization for semi-supervised learning[J]. Front. Comput. Sci., 2021, 15(1): 151303-.
[7] Qianchen YU, Zhiwen YU, Zhu WANG, Xiaofeng WANG, Yongzhi WANG. Estimating posterior inference quality of the relational infinite latent feature model for overlapping community detection[J]. Front. Comput. Sci., 2020, 14(6): 146323-.
[8] Parnika PARANJAPE, Meera DHABU, Parag DESHPANDE. A novel classifier for multivariate instance using graph class signatures[J]. Front. Comput. Sci., 2020, 14(4): 144307-.
[9] Muhammad Aminur RAHAMAN, Mahmood JASIM, Md. Haider ALI, Md. HASANUZZAMAN. Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language[J]. Front. Comput. Sci., 2020, 14(3): 143302-.
[10] Hui XUE, Haiming XU, Xiaohong CHEN, Yunyun WANG. A primal perspective for indefinite kernel SVM problem[J]. Front. Comput. Sci., 2020, 14(2): 349-363.
[11] Xibin DONG, Zhiwen YU, Wenming CAO, Yifan SHI, Qianli MA. A survey on ensemble learning[J]. Front. Comput. Sci., 2020, 14(2): 241-258.
[12] Yan ZHU, Khaled RIAD, Ruiqi GUO, Guohua GAN, Rongquan FENG. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain[J]. Front. Comput. Sci., 2019, 13(6): 1182-1197.
[13] Lian YU, Wei-Tek TSAI. State synchronization in process-oriented chaincode[J]. Front. Comput. Sci., 2019, 13(6): 1166-1181.
[14] Yu ZHANG, Yuxing HAN, Jiangtao WEN. SMER: a secure method of exchanging resources in heterogeneous internet of things[J]. Front. Comput. Sci., 2019, 13(6): 1198-1209.
[15] Libo FENG, Hui ZHANG, Wei-Tek TSAI, Simeng SUN. System architecture for high-performance permissioned blockchains[J]. Front. Comput. Sci., 2019, 13(6): 1151-1165.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed