Comparative Analysis of Phishing Detection in Ethereum Cryptocurrency Transactions Using SMOTE-Based Random Forest and LightGBM Algorithms
Kata Kunci:
Phishing Detection, Cryptocurrency Transactions, Ethereum, Machine Learning, Data Imbalance, Ensemble AlgorithmsAbstrak
The rapid growth of cryptocurrency adoption has increased the risk of phishing attacks targeting blockchain transactions, particularly within the Ethereum ecosystem. This study aims to conduct a comparative analysis of machine learning approaches for detecting phishing transactions by addressing the challenge of highly imbalanced data. A supervised classification framework is developed using Random Forest and Light Gradient Boosting Machine algorithms, combined with the Synthetic Minority Over sampling Technique to enhance minority class representation. The research process involves data preprocessing, feature normalization, class balancing, model training, and performance evaluation using appropriate classification metrics. The findings indicate that ensemble based methods are effective in capturing complex transaction patterns and distinguishing legitimate from phishing activities. Random Forest demonstrates more robust and consistent performance compared to Light Gradient Boosting Machine, particularly in minimizing misclassification of fraudulent transactions. These results highlight the importance of data balancing techniques and algorithm selection in improving blockchain security. The study contributes to the development of reliable phishing detection models that can support safer cryptocurrency transaction environments.
Unduhan
Referensi
S. Saksonova and I. Kuzmina-Merlino, “Cryptocurrency as an investment instrument in a modern financial market,” Вестник Санкт-Петербургского университета. Экономика, vol. 35, no. 2, pp. 269–282, 2019.
J. Yang et al., “Who stole my nft? investigating web3 nft phishing scams on ethereum,” IEEE Trans. Inf. Forensics Secur., 2024.
Y. Qi, J. Wu, H. Xu, and M. Guizani, “Blockchain data mining with graph learning: A survey,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 46, no. 2, pp. 729–748, 2023.
Y. Wan, F. Xiao, and D. Zhang, “Early-stage phishing detection on the Ethereum transaction network,” Soft Comput., vol. 27, no. 7, pp. 3707–3719, 2023.
S. Siddique, M. A. Haque, R. George, K. D. Gupta, D. Gupta, and M. J. H. Faruk, “Survey on machine learning biases and mitigation techniques,” Digital, vol. 4, no. 1, pp. 1–68, 2023.
F. A. Ghaleb, F. Saeed, M. Al-Sarem, S. N. Qasem, and T. Al-Hadhrami, “Ensemble synthesized minority oversampling-based generative adversarial networks and random forest algorithm for credit card fraud detection,” IEEE Access, vol. 11, pp. 89694–89710, 2023.
R. Bakır, C. Orak, and A. Yüksel, “Optimizing hydrogen evolution prediction: A unified approach using random forests, lightGBM, and Bagging Regressor ensemble model,” Int. J. Hydrogen Energy, vol. 67, pp. 101–110, 2024.
A. Parhi, “Blockchain in finance: Applications, platforms, and global trends in a decentralizing ecosystem,” Platforms, Glob. Trends a Decentralizing Ecosyst. (June 06, 2025), 2025.
R. O. Ogundokun, M. O. Arowolo, R. Damaševičius, and S. Misra, “Phishing detection in blockchain transaction networks using ensemble learning,” in Telecom, MDPI, 2023, pp. 279–297.
S. Hisham, M. Makhtar, and A. A. Aziz, “Combining multiple classifiers using ensemble method for anomaly detection in blockchain networks: A comprehensive review,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 8, 2022.
M. Ghosh, D. Ghosh, R. Halder, and J. Chandra, “Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection,” Blockchain Res. Appl., vol. 4, no. 4, p. 100153, 2023.
M. Carvalho, A. J. Pinho, and S. Brás, “Resampling approaches to handle class imbalance: a review from a data perspective,” J. Big Data, vol. 12, no. 1, p. 71, 2025.
A. A. Alhashmi, A. M. Alashjaee, A. A. Darem, A. F. Alanazi, and R. Effghi, “An ensemble-based fraud detection model for financial transaction cyber threat classification and countermeasures,” Eng. Technol. Appl. Sci. Res., vol. 13, no. 6, pp. 12433–12439, 2023.
M. Riham, “A Comparative Study of Random Forest and XGBoost for Detecting Credit Card Fraud Transactions using Big Data,” BCAS Campus, 2025.
C. Müller-Bloch and J. Kranz, “A framework for rigorously identifying research gaps in qualitative literature reviews,” 2015.
J. Huang et al., “Speed/accuracy trade-offs for modern convolutional object detectors,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 7310–7311.











