Cryptocurrency Scams: Analysis and Perspectives
نویسندگان
چکیده
Since the inception of Bitcoin in 2009, market cryptocurrencies has grown beyond initial expectations, as witnessed by thousands tokenised assets available on market, whose daily trades amount to dozens USD billions. The pseudonymity features these have attracted attention cybercriminals, who exploit them carry out potentially untraceable scams. wide range cryptocurrency-based scams observed over last ten years fostered research analysis their effects, and development techniques counter them. However, doing this field requires addressing several challenges: for instance, although a few data sources about cryptocurrency are publicly available, they often contain incomplete or misclassified data. Further, there is no standard taxonomy scams, which leads ambiguous incoherent interpretations nature. Indeed, unavailability reliable datasets makes it difficult train effective automatic classifiers that can detect analyse In paper, we perform an extensive review scientific literature systematise according novel taxonomy. By collecting homogenising from different public sources, build uniform dataset scams.We devise tool recognises classifies our taxonomy.We assess effectiveness through performance metrics.We also give in-depth classification results, offering insights into threat types, connection with other types. Finally, provide set guidelines policymakers could follow improve user protection against
منابع مشابه
Understanding Craigslist Rental Scams
Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of techniques that allowed us to identify scam campaigns and our automated system that is abl...
متن کاملCryptocurrency Voting Games
This work shows that weighted majority voting games occur in cryptocurrencies. In particular, two such games are highlighted. The first game, which we call the Rule Game, pertains to the scenario where the entities in the system engage in a voting procedure to accept or reject a change of rules. The second game, which we call the Attack Game, refers to the scenario where a group of entities in ...
متن کاملAvoiding the SCAMs
Dendrites from the same neuron usually avoid contact with one another, a behavior known as self-avoidance. In this issue of Neuron and in the upcoming May 4, 2007 issue of Cell, a pair of studies by Soba et al. and Hughes et al. and a study by Matthews et al., respectively, identify products from the highly alternatively spliced Dscam gene as central to this behavior in Drosophila. Signaling in...
متن کاملPersonal Fraud: the Victims and the Scams
The evidence from fraud victimization surveys is unanimous that repeat victimization is common. Greater education is not a protective factor against victimization; the evidence points to the reverse. Much evidence also suggests that older people are not at greater risk of fraud victimization. It may be that younger and better-educated people have wider interests, engage in a broader range of ac...
متن کاملCryptocurrency Mining – Transition to Cloud
Cryptocurrency, a form of digital currency that has an open and decentralized system and uses cryptography to enhance security and control the creation of new units, is touted to be the next step from conventional monetary transactions. Many cryptocurrencies exist today, with Bitcoin being the most prominent of them. Cryptocurrencies are generated by mining, as a fee for validating any transact...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3123894