Identifying User Behavior Profiles in Ethereum Using Machine Learning Techniques

被引:0
|
作者
Valadares, Julia Almeida [1 ]
Oliveira, Vinicius C. [1 ]
de Azevedo Sousa, Jose Eduardo [1 ]
Bernardino, Heder S. [1 ]
Villela, Saulo Moraes [1 ]
Vieira, Alex Borges [1 ]
Goncalves, Glauber [2 ]
机构
[1] Fed Univ Juiz de Fora UFJF, Juiz De Fora, MG, Brazil
[2] Fed Univ Piaui UFPI, Teresina, Piaui, Brazil
基金
巴西圣保罗研究基金会;
关键词
Cryptocurrency; Blockchain; Transactions; Machine Learning;
D O I
10.1109/BLOCKCHAIN53845.2021.00052
中图分类号
学科分类号
摘要
Ethereum is one of the largest blockchain platforms currently that has become a digital business environment for users. This platform is designed to allow decentralized transactions between anonymous users. Thus, the development of methods to identify user behavior profiles, keeping their identities anonymous, has the potential to leverage business on this platform. In this work, we investigate the use of machine learning to classify a user profile as professional or common based on the attributes of their transactions. This classification is challenging due to the small fraction of publicly labeled users in Ethereum and still the considerably smaller fraction of professional users. To conduct this investigation, we train models considering carefully balanced sets of transactions with labeled users. Our results show high performance models for the classification of profiles, achieving a performance greater than 90% for accuracy, precision, and other related measures. In addition, we have identified the most relevant features in transactions for this classification.
引用
收藏
页码:327 / 332
页数:6
相关论文
共 50 条
  • [1] Identifying Engineering Undergraduates' Learning Style Profiles Using Machine Learning Techniques
    Ramirez-Correa, Patricio
    Alfaro-Perez, Jorge
    Gallardo, Mauricio
    APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [2] User Behavior Analysis with Machine Learning Techniques in Cloud Computing Architectures
    Callara, Matias
    Wira, Patrice
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON APPLIED SMART SYSTEMS (ICASS), 2018,
  • [3] Identifying Giant Clams Species using Machine Learning Techniques
    Dabalos, Jonilyn T.
    Edullantes, Christine Mae A.
    Buladaco, Mark Van M.
    Gumanao, Girley S.
    2021 THE 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION PROCESSING, ICCIP 2021, 2021, : 51 - 55
  • [4] Identifying click baits using various machine learning and deep learning techniques
    Ghosh S.
    International Journal of Information Technology, 2021, 13 (3) : 1235 - 1242
  • [5] Symbolic and probabilistic techniques for learning user profiles
    Basile, T
    Degemmis, M
    Di Mauro, N
    Esposito, F
    Ferilli, S
    CONCURRENT ENGINEERING: ADVANCED DESIGN, PRODUCTION AND MANAGEMENT SYSTEMS, 2003, : 451 - 456
  • [6] Machine learning of user profiles: Representational issues
    Bloedorn, E
    Mani, I
    MacMillan, TR
    PROCEEDINGS OF THE THIRTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE, VOLS 1 AND 2, 1996, : 433 - 438
  • [7] Identifying Auto-Generated Code by Using Machine Learning Techniques
    Shimonaka, Kento
    Sumi, Soichi
    Higo, Yoshiki
    Kusumoto, Shinji
    PROCEEDINGS 7TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2016), 2016, : 18 - 23
  • [8] Identifying computers hidden behind a NAT using machine learning techniques
    Zakin, Ori
    Levi, Metal
    Elovici, Yuval
    Rockach, Lior
    Shafrir, Nir
    Sinter, Guy
    Pen, Ofer
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 335 - 340
  • [9] Discovering user communities on the Internet using unsupervised machine learning techniques
    Paliouras, G
    Papatheodorou, C
    Karkaletsis, V
    Spyropoulos, CD
    INTERACTING WITH COMPUTERS, 2002, 14 (06) : 761 - 791
  • [10] An Analysis of User Behaviors in Phishing eMail using Machine Learning Techniques
    Li, Yi
    Xiong, Kaiqi
    Li, Xiangyang
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 529 - 534