
ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

ICS 206–01: The New Standard Every OSINT Professional Must Know
Explore ICS 206–01: Essential updates for OSINT pros on AI citations, sourcing rules, retention, and a checklist for seamless compliance.What is an Intelligence Community Standard?A new directive, the Intelligence Community Standard (ICS), has just been released, offering a framework designed to ensure consistency, accuracy, and professionalism across the U.S. Intelligence Community (IC). ICS directives provide clear guidelines for processes, methodologies, and workflows, enabling intelligenc...

Python for Dark Web OSINT: Automate Threat Monitoring
Enhance your OSINT toolkit! Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. This article is also published on my Medium page. In my previous article, “OSINT: Persistent Threat Monitoring with Google Programmable Search Engines,” I explored the value of open-source intelligence (OSINT) techniques for tracking threats. Since then, I’ve received many questions about how to apply similar methods to the dark web. W...

Point-and-Click OSINT: Dark Web Scraping with GUI Tools
Discover how to gather OSINT data from the dark web without coding. Learn point-and-click scraping tools, techniques, & essential privacy tips. This article is also published on my Medium page. You guys seemed to have enjoyed the last article — Python, dark web OSINT, the whole nine yards! Setting up those scripts, digging into the code… it’s the kind of stuff that makes a cybersecurity geek’s heart sing. But hey, I get it — not everyone wants to get their hands quite so dirty with code. A fe...
Writing about blockchain security and blockchain forensics. Follow me on Twitter for the latest insights.

Subscribe to Ervin Zubic

Subscribe to Ervin Zubic
<100 subscribers
<100 subscribers
Share Dialog
Share Dialog


Learn about MEV bots, the lurking programs exploiting Ethereum, and how new research fights back for trader safety.
You can also find this article on my Medium page.
As blockchain technology continues to evolve, bots within decentralized financial systems offer both efficiency gains and risks to market fairness. The study “Detecting Financial Bots on the Ethereum Blockchain” by Thomas Niedermayer, Pietro Saggese, and Bernhard Haslhofer (2024) delves into this dual-edged phenomenon. The research explores the development and application of machine learning techniques to identify financial bots on the Ethereum platform, offering insights into their operations and implications for the cryptocurrency ecosystem.
This research focuses on the crucial task of detecting financial bots within the Ethereum blockchain. The authors propose a flexible, machine-learning-based approach, unlike previous rule-based detection systems. Initially, they established a taxonomy of financial bots, categorized into seven types with 24 subcategories, using a literature review and anecdotal evidence. They then construct a dataset labeled with ‘human’ or ‘bot’ classifications through manual annotation by independent reviewers.
The methodology encompasses unsupervised and supervised machine learning algorithms, notably Gaussian Mixture Models and Random Forests, which achieve up to 83% accuracy. These models are trained on features derived from transaction data, such as frequency, gas price, and transaction time intervals, illustrating their potential to distinguish bot behavior effectively.

The study’s strength lies in its innovative use of machine learning to improve the flexibility and accuracy of bot detection over traditional methods. Creating a ground-truth dataset provides a robust foundation for training and validating the proposed models. However, the research has limitations. The dataset, while meticulously annotated, is relatively small, potentially limiting the generalizability of the findings. Moreover, the focus is solely on Ethereum, which may not encapsulate the diversity of bot behaviors across different blockchain platforms.
Perhaps the most intriguing aspect of this study is the sophisticated taxonomy of bots that have been developed, which includes categories like MEV bots that exploit minimal extractable value. This classification deepens the understanding of bot strategies and aids in target detection, which is critical given the complex and evolving nature of bot interventions in crypto markets.
The implications of this research are significant, suggesting potential advancements in securing blockchain ecosystems against malicious bot activities. Enhancing bot detection can foster a more stable and fair trading environment. The methods and findings could catalyze further studies, potentially leading to the development of real-time detection systems that could be integrated into blockchain networks, thereby elevating the security and integrity of decentralized financial transactions.
The study “Detecting Financial Bots on the Ethereum Blockchain” makes a compelling case for applying machine learning in cryptocurrency security. Bridging the gap between theoretical bot classification and practical detection tools sets a precedent for future research in the domain. This work highlights the nuanced challenges financial bots pose and charts a course toward mitigating their adverse effects, encouraging a broader exploration of machine learning applications in blockchain technology.
To get the most out of this research paper, it’s helpful to grasp a few key concepts related to blockchains, and specifically, the Ethereum blockchain:
Blockchain: A decentralized and distributed ledger. Think of it as a large, unchangeable database where each “block” contains transaction records. These blocks are linked securely, making tampering with past transactions extremely difficult.
Ethereum: A prominent blockchain platform known for its smart contract capabilities. Ethereum serves as both a platform for its native cryptocurrency (Ether or ETH) and a foundation for creating decentralized applications (DApps).
Smart Contract: A self-executing computer program on the blockchain. It contains pre-defined rules that automatically execute when certain conditions are met. Think of it as a digital contract.
Decentralized Finance (DeFi): Financial services and products built on a blockchain. DeFi eliminates intermediaries like banks, allowing for peer-to-peer transactions and more complex financial services using smart contracts.
Transactions: The fundamental actions on a blockchain. On Ethereum, this might be sending ETH, interacting with a smart contract, or deploying a new smart contract.
Understanding these terms will significantly enhance your understanding of the research paper and how bots potentially interact with the broader blockchain ecosystem.
For more blockchain, cybersecurity, and cybercrime research, visit Blockchain Insights Hub.
Follow me on Twitter to get the latest articles and updates directly in your feed. Alternatively, you can subscribe to receive alerts via email whenever I publish new content.
Learn about MEV bots, the lurking programs exploiting Ethereum, and how new research fights back for trader safety.
You can also find this article on my Medium page.
As blockchain technology continues to evolve, bots within decentralized financial systems offer both efficiency gains and risks to market fairness. The study “Detecting Financial Bots on the Ethereum Blockchain” by Thomas Niedermayer, Pietro Saggese, and Bernhard Haslhofer (2024) delves into this dual-edged phenomenon. The research explores the development and application of machine learning techniques to identify financial bots on the Ethereum platform, offering insights into their operations and implications for the cryptocurrency ecosystem.
This research focuses on the crucial task of detecting financial bots within the Ethereum blockchain. The authors propose a flexible, machine-learning-based approach, unlike previous rule-based detection systems. Initially, they established a taxonomy of financial bots, categorized into seven types with 24 subcategories, using a literature review and anecdotal evidence. They then construct a dataset labeled with ‘human’ or ‘bot’ classifications through manual annotation by independent reviewers.
The methodology encompasses unsupervised and supervised machine learning algorithms, notably Gaussian Mixture Models and Random Forests, which achieve up to 83% accuracy. These models are trained on features derived from transaction data, such as frequency, gas price, and transaction time intervals, illustrating their potential to distinguish bot behavior effectively.

The study’s strength lies in its innovative use of machine learning to improve the flexibility and accuracy of bot detection over traditional methods. Creating a ground-truth dataset provides a robust foundation for training and validating the proposed models. However, the research has limitations. The dataset, while meticulously annotated, is relatively small, potentially limiting the generalizability of the findings. Moreover, the focus is solely on Ethereum, which may not encapsulate the diversity of bot behaviors across different blockchain platforms.
Perhaps the most intriguing aspect of this study is the sophisticated taxonomy of bots that have been developed, which includes categories like MEV bots that exploit minimal extractable value. This classification deepens the understanding of bot strategies and aids in target detection, which is critical given the complex and evolving nature of bot interventions in crypto markets.
The implications of this research are significant, suggesting potential advancements in securing blockchain ecosystems against malicious bot activities. Enhancing bot detection can foster a more stable and fair trading environment. The methods and findings could catalyze further studies, potentially leading to the development of real-time detection systems that could be integrated into blockchain networks, thereby elevating the security and integrity of decentralized financial transactions.
The study “Detecting Financial Bots on the Ethereum Blockchain” makes a compelling case for applying machine learning in cryptocurrency security. Bridging the gap between theoretical bot classification and practical detection tools sets a precedent for future research in the domain. This work highlights the nuanced challenges financial bots pose and charts a course toward mitigating their adverse effects, encouraging a broader exploration of machine learning applications in blockchain technology.
To get the most out of this research paper, it’s helpful to grasp a few key concepts related to blockchains, and specifically, the Ethereum blockchain:
Blockchain: A decentralized and distributed ledger. Think of it as a large, unchangeable database where each “block” contains transaction records. These blocks are linked securely, making tampering with past transactions extremely difficult.
Ethereum: A prominent blockchain platform known for its smart contract capabilities. Ethereum serves as both a platform for its native cryptocurrency (Ether or ETH) and a foundation for creating decentralized applications (DApps).
Smart Contract: A self-executing computer program on the blockchain. It contains pre-defined rules that automatically execute when certain conditions are met. Think of it as a digital contract.
Decentralized Finance (DeFi): Financial services and products built on a blockchain. DeFi eliminates intermediaries like banks, allowing for peer-to-peer transactions and more complex financial services using smart contracts.
Transactions: The fundamental actions on a blockchain. On Ethereum, this might be sending ETH, interacting with a smart contract, or deploying a new smart contract.
Understanding these terms will significantly enhance your understanding of the research paper and how bots potentially interact with the broader blockchain ecosystem.
For more blockchain, cybersecurity, and cybercrime research, visit Blockchain Insights Hub.
Follow me on Twitter to get the latest articles and updates directly in your feed. Alternatively, you can subscribe to receive alerts via email whenever I publish new content.
Bots: Automated software programs that carry out specific tasks on the blockchain. Financial bots are especially relevant to this research, as they often aim to gain financial advantages.
MEV (Maximal Extractable Value): The profit that can potentially be gained by strategically reordering or inserting transactions within a block. Miners/validators have some control over this order, allowing MEV bots to exploit this for profit, often to the detriment of regular users.
Bots: Automated software programs that carry out specific tasks on the blockchain. Financial bots are especially relevant to this research, as they often aim to gain financial advantages.
MEV (Maximal Extractable Value): The profit that can potentially be gained by strategically reordering or inserting transactions within a block. Miners/validators have some control over this order, allowing MEV bots to exploit this for profit, often to the detriment of regular users.
No activity yet