{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,18]],"date-time":"2024-05-18T17:00:11Z","timestamp":1716051611196},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Key Research and Development Program of China","award":["No.2021YFF0307203","No.2019QY1300"]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association CAS","doi-asserted-by":"crossref","award":["No.2021156"],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Strategic Priority Research Program of Chinese Academy of Sciences","award":["No.XDC02040100"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61802404"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"published-print":{"date-parts":[[2022,12]]},"abstract":"Abstract<\/jats:title>With the wide application and development of blockchain technology in various fields such as finance, government affairs and medical care, security incidents occur frequently on it, which brings great threats to users\u2019 assets and information. Many researchers have worked on blockchain abnormal behavior awareness in respond to these threats. We summarize respectively the existing public blockchain and consortium blockchain abnormal behavior awareness methods and ideas in detail as the difference between the two types of blockchain. At the same time, we summarize and analyze the existing data sets related to mainstream blockchain security, and finally discuss possible future research directions. Therefore, this work can provide a reference for blockchain security awareness research.<\/jats:p>","DOI":"10.1186\/s42400-021-00107-4","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T02:02:48Z","timestamp":1646100168000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain abnormal behavior awareness methods: a survey"],"prefix":"10.1186","volume":"5","author":[{"given":"Chuyi","family":"Yan","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zehui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baoxu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"107_CR1","doi-asserted-by":"crossref","unstructured":"Alangot B, Reijsbergen D, Venugopalan S, Szalachowski P (2020) Decentralized lightweight detection of eclipse attacks on bitcoin clients. In: 2020 IEEE international conference on blockchain (blockchain). IEEE, pp 337\u2013342","DOI":"10.1109\/Blockchain50366.2020.00049"},{"key":"107_CR2","doi-asserted-by":"publisher","first-page":"87299","DOI":"10.1109\/ACCESS.2021.3086225","volume":"9","author":"A Alharthi","year":"2021","unstructured":"Alharthi A, Ni Q, Jiang R (2021) A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET. IEEE Access 9:87299\u201387309","journal-title":"IEEE Access"},{"key":"107_CR3","doi-asserted-by":"crossref","unstructured":"Ao X, Liu Y, Qin Z, Sun Y, He Q (2021) Temporal high-order proximity aware behavior analysis on Ethereum. World Wide Web, pp 1\u201321","DOI":"10.1007\/s11280-021-00875-6"},{"key":"107_CR4","first-page":"23","volume":"14","author":"D Arp","year":"2014","unstructured":"Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: Effective and explainable detection of android malware in your pocket. Ndss 14:23\u201326","journal-title":"Ndss"},{"key":"107_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese G, Faonio A, Magri B, De Medeiros B (2014) Certified bitcoins. In: International conference on applied cryptography and network security. Springer, pp 80\u201396","DOI":"10.1007\/978-3-319-07536-5_6"},{"key":"107_CR6","unstructured":"Attorney O (2019) Manhattan U.S. Attorney announces charges against leaders of \u201cOneCoin,\u201d a multibillion-dollar pyramid scheme involving the sale of a fraudulent cryptocurrency (2019). https:\/\/www.justice.gov\/usao-sdny\/pr\/manhattan-us-attorney-announces-charges-against-leaders-onecoin-multibillion-dollar Accessed 8 March"},{"key":"107_CR7","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.future.2019.08.014","volume":"102","author":"M Bartoletti","year":"2020","unstructured":"Bartoletti M, Carta S, Cimoli T, Saia R (2020) Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Future Gener Comput Syst 102:259\u2013277","journal-title":"Future Gener Comput Syst"},{"key":"107_CR8","doi-asserted-by":"crossref","unstructured":"Baumgart I, Heep B, Krause S (2007) Oversim: a flexible overlay network simulation framework. In: 2007 IEEE global internet symposium. IEEE, pp 79\u201384","DOI":"10.1109\/GI.2007.4301435"},{"issue":"11","key":"107_CR9","first-page":"54","volume":"2020","author":"C Chen","year":"2020","unstructured":"Chen C (2020) The key technologies of consortium blockchain and the supervision challenges of blockchain. China Ind Inf Technol 2020(11):54\u201358","journal-title":"China Ind Inf Technol"},{"issue":"1","key":"107_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398071","volume":"21","author":"L Chen","year":"2020","unstructured":"Chen L, Peng J, Liu Y, Li J, Xie F, Zheng Z (2020) Phishing scams detection in Ethereum transaction network. ACM Trans Internet Technol 21(1):1\u20136","journal-title":"ACM Trans Internet Technol"},{"key":"107_CR11","doi-asserted-by":"crossref","unstructured":"Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting Ponzi schemes on Ethereum: towards healthier blockchain technology. In: Proceedings of the 2018 world wide web conference. pp 1409\u20131418","DOI":"10.1145\/3178876.3186046"},{"key":"107_CR12","doi-asserted-by":"crossref","unstructured":"Chen W, Wu J, Zheng Z, Chen C, Zhou Y (2019) Market manipulation of bitcoin: Evidence from mining the Mt. Gox transaction network. In: IEEE conference on computer communications. pp 964\u2013972","DOI":"10.1109\/INFOCOM.2019.8737364"},{"key":"107_CR13","doi-asserted-by":"crossref","unstructured":"Chen W, Guo X, Chen Z, Zheng Z, Lu Y (2020) Phishing scam detection on Ethereum: towards financial security for blockchain ecosystem. In: International joint conferences on artificial intelligence organization. pp 4506\u20134512","DOI":"10.24963\/ijcai.2020\/621"},{"key":"107_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12243-019-00746-2","volume":"75","author":"V Chicarino","year":"2020","unstructured":"Chicarino V, Albuquerque C, Jesus E, Rocha A (2020) On the detection of selfish mining and stalker attacks in blockchain networks. Ann Telecommun 75:143\u2013152","journal-title":"Ann Telecommun"},{"key":"107_CR15","unstructured":"CNCERT\/CC (2020) 2020 Blockchain security situation perception report. https:\/\/bc.cnvd.org.cn\/notice_info?num=0c4088bbb6f7346000c3ac1ce13f0347 Accessed 5 Mar 2021"},{"key":"107_CR16","unstructured":"Community B (2020) Beam: the scalable confidential cryptocurrency. 2 Feb 2020. https:\/\/docs.beam.mw\/BEAM_Position_Paper_0.3.pdf"},{"key":"107_CR17","doi-asserted-by":"crossref","unstructured":"de BT, Hernandez-Castro J (2017) An analysis of bitcoin laundry services. In: Springer (ed.) Nordic conference on secure IT systems. pp 297\u2013312","DOI":"10.1007\/978-3-319-70290-2_18"},{"key":"107_CR18","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems. Springer, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"107_CR19","doi-asserted-by":"crossref","unstructured":"El\u00a0Defrawy K, Lampkins J (2014) Founding digital currency on secure computation. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 1\u201314","DOI":"10.1145\/2660267.2660293"},{"key":"107_CR20","unstructured":"Elliptic: Elliptic data set (2019) https:\/\/www.elliptic.co"},{"key":"107_CR21","doi-asserted-by":"crossref","unstructured":"Eyal I, Sirer EG (2014) Majority is not enough: bitcoin mining is vulnerable. In: International conference on financial cryptography and data security. Springer, pp 436\u2013454","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"107_CR22","unstructured":"Frankenfield J (2019a) 51% Attack. 6 May 2019. https:\/\/www.investopedia.com\/terms\/1\/51-attack.asp"},{"key":"107_CR23","unstructured":"Frankenfield J. (2019b) Selfish mining. 1 Apr 2021. https:\/\/www.investopedia.com\/terms\/s\/selfish-mining.asp"},{"key":"107_CR24","doi-asserted-by":"crossref","unstructured":"Fujisaki E, Suzuki K (2007) Traceable ring signature. In: International workshop on public key cryptography. Springer, pp 181\u2013200","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"107_CR25","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame GO, W\u00fcst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. pp 3\u201316","DOI":"10.1145\/2976749.2978341"},{"issue":"4","key":"107_CR26","first-page":"1010","volume":"28","author":"J Gong","year":"2017","unstructured":"Gong J, Zang X, Su Q, Hu X, Xu J (2017) Survey of network security situation awareness. J Softw 28(4):1010\u20131026","journal-title":"J Softw"},{"key":"107_CR27","doi-asserted-by":"crossref","unstructured":"Groth J, Sahai A (2008) Efficient non-interactive proof systems for bilinear groups. In: Springer (ed.) Annual international conference on the theory and applications of cryptographic techniques, pp 415\u2013432","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"107_CR28","doi-asserted-by":"publisher","first-page":"12118","DOI":"10.1109\/ACCESS.2018.2805783","volume":"6","author":"J Gu","year":"2018","unstructured":"Gu J, Sun B, Du X, Wang J, Zhuang Y, Wang Z (2018) Consortium blockchain-based malware detection in mobile devices. IEEE Access 6:12118\u201312128","journal-title":"IEEE Access"},{"key":"107_CR29","unstructured":"Guegan, D.: Public blockchain versus private blockhain (2017)"},{"key":"107_CR30","unstructured":"Guo, Z., Guo, S., Zhang, S., Song, L., Wang, H.: Analysis of cross-chain technology of blockchain. Chin J Internet Things 35\u201348 (2020)"},{"issue":"5","key":"107_CR31","first-page":"470","volume":"5","author":"J Han","year":"2018","unstructured":"Han J, Zou J, Jiang H, Xu Q (2018) Research on mining attacks in bitcoin. J Cryptol Res 5(5):470\u2013483","journal-title":"J Cryptol Res"},{"issue":"1","key":"107_CR32","doi-asserted-by":"publisher","first-page":"011101","DOI":"10.1063\/1.5135739","volume":"30","author":"Q Han","year":"2020","unstructured":"Han Q, Wu J, Zheng Z (2020) Long-range dependence, multi-fractality and volume-return causality of ether market. Chaos Interdiscip J Nonlinear Sci 30(1):011101","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"107_CR33","unstructured":"Heilman E, Kendler A, Zohar A, Goldberg S (2015) Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: 24th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 15), pp 129\u2013144"},{"issue":"01","key":"107_CR34","first-page":"18","volume":"34","author":"X Hong","year":"2020","unstructured":"Hong X, Wang Y, Liao F (2020) Review on the technology research of blockchain security supervision. Bulletin of National Natural Science Foundation of China 34(01):18\u201324","journal-title":"Bulletin of National Natural Science Foundation of China"},{"key":"107_CR35","doi-asserted-by":"crossref","unstructured":"Hope-Bailie A, Thomas S (2016) Interledger: Creating a standard for payments. In: Proceedings of the 25th international conference companion on world wide web. pp 281\u2013282","DOI":"10.1145\/2872518.2889307"},{"key":"107_CR36","unstructured":"Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the bitcoin network. arXiv:1912.12060"},{"issue":"19","key":"107_CR37","doi-asserted-by":"publisher","first-page":"20099","DOI":"10.1007\/s11042-017-4396-4","volume":"76","author":"B Huang","year":"2017","unstructured":"Huang B, Liu Z, Chen J, Liu A, Liu Q, He Q (2017) Behavior pattern clustering in blockchain networks. Multimed Tools Appl 76(19):20099\u201320110","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"107_CR38","doi-asserted-by":"publisher","first-page":"4291","DOI":"10.1109\/JIOT.2020.3028449","volume":"8","author":"C Huang","year":"2020","unstructured":"Huang C, Wang Z, Chen H, Hu Q, Zhang Q, Wang W, Guan X (2020) Repchain: a reputation-based secure, fast, and high incentive blockchain system via sharding. IEEE Internet Things J 8(6):4291\u20134304","journal-title":"IEEE Internet Things J"},{"key":"107_CR39","doi-asserted-by":"crossref","unstructured":"Huang Y, Kong Q, Jia N, Chen X, Zheng Z (2019) Recommending differentiated code to support smart contract update. In: Proceedings of the 27th international conference on program comprehension, pp 260\u2013270","DOI":"10.1109\/ICPC.2019.00045"},{"key":"107_CR40","doi-asserted-by":"crossref","unstructured":"Ismail H, Germanus D, Suri N (2015) Detecting and mitigating p2p eclipse attacks. In: 2015 IEEE 21st international conference on parallel and distributed systems (ICPADS). IEEE, pp 224\u2013231","DOI":"10.1109\/ICPADS.2015.36"},{"key":"107_CR41","unstructured":"Krupp J, Rossow C. (2018) teether: Gnawing at Ethereum to automatically exploit smart contracts. In: 27th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 18), pp 1317\u20131333"},{"key":"107_CR42","unstructured":"Kwon J, Buchman E. (2018) A network of distributed ledgers. Cosmos Dated 1\u201341"},{"key":"107_CR43","doi-asserted-by":"crossref","unstructured":"Lei K, Zhang Q, Xu L, Qi Z (2018) Reputation-based byzantine fault-tolerance for consortium blockchain. In: IEEE (ed.) 2018 IEEE 24th international conference on parallel and distributed systems (ICPADS), pp 604\u2013611","DOI":"10.1109\/PADSW.2018.8644933"},{"issue":"9","key":"107_CR44","first-page":"6","volume":"9","author":"D Li","year":"2020","unstructured":"Li D (2020) Discussion on block chain ecological construction based on china\u2019s independent and controllable basic public block chain. Inf Sec Technol 9(9):6\u20139","journal-title":"Inf Sec Technol"},{"issue":"5","key":"107_CR45","first-page":"1061","volume":"42","author":"P Li","year":"2020","unstructured":"Li P, Xu H (2020) Blockchain user anonymity and traceability technology. J Electron Inf Technol 42(5):1061\u20131067","journal-title":"J Electron Inf Technol"},{"key":"107_CR46","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2021.01.081","volume":"561","author":"P Li","year":"2021","unstructured":"Li P, Xu H, Ma T (2021) An efficient identity tracing scheme for blockchain-based systems. Inf Sci 561:130\u2013140","journal-title":"Inf Sci"},{"issue":"3","key":"107_CR47","first-page":"159","volume":"6","author":"P Li","year":"2021","unstructured":"Li P, Xu H, Ma T (2021) Research progress of blockchain privacy protection and supervision technology. J Cyber Sec 6(3):159\u2013168","journal-title":"J Cyber Sec"},{"key":"107_CR48","doi-asserted-by":"crossref","unstructured":"Liu JK, Wei VK, Wong DS (2004) Linkable spontaneous anonymous group signature for ad hoc groups. In: Australasian conference on information security and privacy. Springer, pp 325\u2013335","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"107_CR49","doi-asserted-by":"crossref","unstructured":"Lorenz J, Silva MI, Apar\u00edcio D, Ascens\u00e3o JT, Bizarro P (2020) Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity. arXiv:2005.14635","DOI":"10.1145\/3383455.3422549"},{"issue":"6","key":"107_CR50","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MS.2017.4121227","volume":"34","author":"Q Lu","year":"2017","unstructured":"Lu Q, Xu X (2017) Adaptable blockchain-based systems: a case study for product traceability. IEEE Softw 34(6):21\u201327","journal-title":"IEEE Softw"},{"key":"107_CR51","first-page":"236","volume":"2018","author":"Y Marcus","year":"2018","unstructured":"Marcus Y, Heilman E, Goldberg S (2018) Low-resource eclipse attacks on Ethereum\u2019s peer-to-peer network. IACR Cryptol ePrint Arch 2018:236","journal-title":"IACR Cryptol ePrint Arch"},{"issue":"1","key":"107_CR52","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/JCIT.2019010102","volume":"21","author":"MI Mehar","year":"2019","unstructured":"Mehar MI, Shier CL, Giambattista A, Gong E, Fletcher G, Sanayhie R, Kim HM, Laskowski M (2019) Understanding a revolutionary and flawed grand experiment in blockchain: the Dao attack. J Cases Inf Technol (JCIT) 21(1):19\u201332","journal-title":"J Cases Inf Technol (JCIT)"},{"key":"107_CR54","doi-asserted-by":"crossref","unstructured":"Monamo P, Marivate V, Twala B (2016) Unsupervised learning for robust bitcoin fraud detection. In: 2016 information security for South Africa (ISSA). IEEE, pp 129\u2013134","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"107_CR55","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus Rev 21260"},{"key":"107_CR56","unstructured":"Narula N, Vasquez W, Virza M (2018) zkledger: privacy-preserving auditing for distributed ledgers. In: 15th $$\\{$$USENIX$$\\}$$ symposium on networked systems design and implementation ($$\\{$$NSDI$$\\}$$ 18), pp 65\u201380"},{"key":"107_CR57","unstructured":"Orcutt M (2020) Criminals laundered \\$2.8 billion in 2019 using crypto exchanges, finds a new analysis (2020). https:\/\/www.technologyreview.com\/2020\/01\/16\/130843\/cryptocurrency-money-laundering-exchanges\/ Accessed 16 January"},{"key":"107_CR58","doi-asserted-by":"crossref","unstructured":"Ostapowicz M, \u017bbikowski K (2020) Detecting fraudulent accounts on blockchain: a supervised approach. In: International conference on web information systems engineering. Springer, pp 18\u201331","DOI":"10.1007\/978-3-030-34223-4_2"},{"key":"107_CR59","unstructured":"Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv:1611.03941"},{"key":"107_CR60","unstructured":"Pongor G (1993) Omnet: objective modular network testbed. In: Proceedings of the international workshop on modeling, analysis, and simulation on computer and telecommunication systems, MASCOTS\u201993, San Diego, CA, USA. Society for Computer Simulation International, pp 323\u2013326"},{"key":"107_CR61","unstructured":"Radix (2018) What is an eclipse attack? 7 June 2018. https:\/\/www.radixdlt.com\/post\/what-is-an-eclipse-attack"},{"key":"107_CR62","unstructured":"Rubixi (2016) Rubixi smart contract. https:\/\/bitcoindtalk.org\/index.php?topic=1400536.0 Accessed 14 Mar 2016"},{"key":"107_CR63","doi-asserted-by":"crossref","unstructured":"Saad M, Njilla L, Kamhoua C, Mohaisen A (2019) Countering selfish mining in blockchains. In: 2019 international conference on computing, networking and communications (ICNC). IEEE, pp 360\u2013364","DOI":"10.1109\/ICCNC.2019.8685577"},{"key":"107_CR64","doi-asserted-by":"crossref","unstructured":"Sayadi S, Rejeb SB, Choukair Z (2019) Anomaly detection model over blockchain electronic transactions. In: 2019 15th international wireless communications and mobile computing conference (IWCMC). IEEE, pp 895\u2013900","DOI":"10.1109\/IWCMC.2019.8766765"},{"key":"107_CR65","first-page":"06559","volume":"2104","author":"J Shen","year":"2021","unstructured":"Shen J, Zhou J, Xie Y, Yu S, Xuan Q (2021) Identity inference on blockchain using graph neural. Network 2104:06559","journal-title":"Network"},{"key":"107_CR66","first-page":"193","volume":"1","author":"M Shen","year":"2021","unstructured":"Shen M, Sang A, Zhu L, Sun R, Zhang C (2021) Abnormal transaction behavior recognition based on motivation analysis in blockchain digital currency. Chin J Comput 1:193\u2013208","journal-title":"Chin J Comput"},{"key":"107_CR67","doi-asserted-by":"crossref","unstructured":"Sheng P, Wang G, Nayak K, Kannan S, Viswanath P (2021) BFT protocol forensics. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security. pp 1722\u20131743","DOI":"10.1145\/3460120.3484566"},{"key":"107_CR68","unstructured":"Shultz BL, Bayer D (2015) Certification of witness: mitigating blockchain fork attacks. Undergraduate Thesis in Mathematics, Columbia University in the City of New York (2015)"},{"key":"107_CR69","unstructured":"Skuchain Forum, W.E.: Inclusive Deployment of Blockchain for Supply Chains (2019). https:\/\/www.weforum.org\/whitepapers\/inclusive-deployment-of-blockchain-for-supply-chains-part-protecting-your-data Accessed 5 June 2019"},{"key":"107_CR70","unstructured":"Su L, Shen X, Du X, Liao X, Wang X, Xing L, Liu B (2021) Evil under the sun: understanding and discovering attacks on Ethereum decentralized applications. In: 30th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 21)"},{"key":"107_CR71","unstructured":"Torres CF, Steichen M et al (2019) The art of the scam: demystifying honeypots in Ethereum smart contracts. In: 28th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 19), pp 1591\u20131607"},{"key":"107_CR72","doi-asserted-by":"crossref","unstructured":"Vasek M, Moore T (2015) There\u2019s no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In: Springer (ed.) International conference on financial cryptography and data security, pp 44\u201361","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"107_CR73","unstructured":"Voell Z (2020) Ethereum classic hit by third 51% attack in a month. https:\/\/www.coindesk.com\/ethereum-classic-blockchain-subject-to-yet-another-51-attack Accessed 30 Aug 2020"},{"key":"107_CR74","unstructured":"Weber M, Domeniconi G, Chen J, Weidele DKI, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics. arXiv:1908.02591"},{"key":"107_CR75","first-page":"26","volume":"7","author":"A Wei","year":"2018","unstructured":"Wei A (2018) Public blockchain technology and its application value. Internet Econ 7:26\u201331","journal-title":"Internet Econ"},{"key":"107_CR76","unstructured":"Wikipedia (2021a) Money laundering. 8 July 2021. https:\/\/en.wikipedia.org\/w\/index.php?title=Money_laundering&oldid=1032228344"},{"key":"107_CR77","unstructured":"Wikipedia (2021b) Ponzi scheme. https:\/\/en.wikipedia.org\/w\/index.php?title=Ponzi_scheme&oldid=1030419781. Accessed 8 July 2021"},{"key":"107_CR78","first-page":"116","volume":"56","author":"G Wu","year":"2020","unstructured":"Wu G, Yu P, Wang K (2020) Transaction regulatory research on double-chain blockchain. Comput Eng Appl 56:116\u2013123","journal-title":"Comput Eng Appl"},{"key":"107_CR79","doi-asserted-by":"crossref","unstructured":"Wu J, Liu J, Chen W, Huang H, Zheng Z, Zhang Y (2020) Detecting mixing services via mining bitcoin transaction network with hybrid motifs. arXiv:2001.05233","DOI":"10.1109\/TSMC.2021.3049278"},{"key":"107_CR80","unstructured":"Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? Phishing scam detection on Ethereum via network embedding. IEEE Tran Syst Man Cybern Syst"},{"issue":"01","key":"107_CR81","first-page":"1","volume":"32","author":"R Xi","year":"2012","unstructured":"Xi R, Yun X, Jin S, Zhang Y (2012) Research survey of network security situation awareness. J Comput Appl 32(01):1\u20134","journal-title":"J Comput Appl"},{"key":"107_CR82","doi-asserted-by":"publisher","first-page":"101604","DOI":"10.1016\/j.cose.2019.101604","volume":"88","author":"G Xu","year":"2020","unstructured":"Xu G, Guo B, Su C, Zheng X, Liang K, Wong DS, Wang H (2020) Am i eclipsed? a smart detector of eclipse attacks for Ethereum. Comput Secur 88:101604","journal-title":"Comput Secur"},{"issue":"3","key":"107_CR83","first-page":"50","volume":"11","author":"X Yang","year":"2020","unstructured":"Yang X (2020) Research of blockchain ecology security challenges and solutions. Inf Secur Technol 11(3):50\u201355","journal-title":"Inf Secur Technol"},{"issue":"2","key":"107_CR84","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2018","unstructured":"Yang Z, Yang K, Lei L, Zheng K, Leung VC (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495\u20131505","journal-title":"IEEE Internet Things J"},{"key":"107_CR86","doi-asserted-by":"crossref","unstructured":"Yuan Z, Yuan Q, Wu J (2020)Phishing detection on Ethereum via learning representation of transaction subgraphs. In: Blockchain and trustworthy systems, pp 178\u2013191","DOI":"10.1007\/978-981-15-9213-3_14"},{"key":"107_CR87","doi-asserted-by":"crossref","unstructured":"Zhang R, Preneel B (2017) Publish or perish: a backward-compatible defense against selfish mining in bitcoin. In: Cryptographers\u2019 track at the RSA conference. Springer, pp 277\u2013292","DOI":"10.1007\/978-3-319-52153-4_16"},{"issue":"1","key":"107_CR88","first-page":"273","volume":"48","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Lou Y (2021) Deep neural network based Ponzi scheme contract detection method. Comput Sci 48(1):273\u2013279","journal-title":"Comput Sci"},{"issue":"2","key":"107_CR90","first-page":"35","volume":"6","author":"G Zhao","year":"2020","unstructured":"Zhao G, Xie Z, Wang X, He J, Zhang C, Lin C, Zhou Z, Chen B, Rong C (2020) Contractguard: defend Ethereum smart contract with embedded intrusion detection. Chin J Netw Inf Secur 6(2):35\u201355","journal-title":"Chin J Netw Inf Secur"},{"key":"107_CR91","doi-asserted-by":"crossref","unstructured":"Zheng H, Wu Q, Qin B, Zhong L, He S, Liu J (2018) Linkable group signature for auditing anonymous communication. In: Australasian conference on information security and privacy. Springer, pp 304\u2013321","DOI":"10.1007\/978-3-319-93638-3_18"},{"key":"107_CR92","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/OJCS.2020.2990458","volume":"1","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zheng Z, Wu J, Dai H-n (2020) Xblock-eth: Extracting and exploring blockchain data from Ethereum. IEEE Open J Comput Soc 1:95\u2013106","journal-title":"IEEE Open J Comput Soc"},{"key":"107_CR93","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData Congress). pp 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"107_CR94","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.future.2021.05.035","volume":"124","author":"Z Zhou","year":"2021","unstructured":"Zhou Z, Wang M, Yang C-N, Fu Z, Xin S, Wu QJ (2021) Blockchain-based decentralized reputation system in e-commerce environment. Future Gener Comput Syst 124:155\u2013167","journal-title":"Future Gener Comput Syst"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00107-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-021-00107-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00107-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T02:14:44Z","timestamp":1646100884000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-021-00107-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":91,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["107"],"URL":"https:\/\/doi.org\/10.1186\/s42400-021-00107-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]},"assertion":[{"value":"7 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"5"}}