Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks
- Authors
-
-
Jennifer BALA
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Sikiru O. SUBAIRU
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Noel M. DOGONYARO
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Joseph A. OJENIYI
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
Suleiman AHMAD
Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria
Author
-
- Keywords:
- Ethereum Blockchain, Ponzi Scheme Detection, XGBoost, Gated Recurrent Unit, Bidirectional Optimization.
- Abstract
-
Blockchain technology, particularly Ethereum, has revolutionized decentralized finance by enabling transparent, secure, and programmable smart contracts. However, these same features have created avenues for financial crimes such as Ponzi schemes, where fraudulent actors exploit pseudonymity and the absence of centralized oversight to deceive investors. This study develops an optimized hybrid detection model that combines eXtreme Gradient Boosting (XGBoost) and Gated Recurrent Units (GRU) to identify Ponzi schemes in Ethereum transaction networks. The model integrates XGBoost’s capability for structured feature learning with GRU’s temporal sequence modeling to capture both static and dynamic behavioral patterns of smart contracts. Using a dataset of 3,866 labeled Ethereum contracts obtained from Kaggle, the research employed advanced preprocessing, temporal sequence enrichment, and class balancing through SMOTE-TS to mitigate data imbalance. Bidirectional optimization, incorporating attention-enhanced GRUs and Bayesian hyperparameter tuning for XGBoost, further improved learning performance and generalization. The model was evaluated using precision, recall, F1-score, ROC-AUC, and PR-AUC, achieving higher detection accuracy of 99% (F1-score = 0.945, ROC-AUC = 0.983) than standalone XGBoost or GRU models. Results demonstrate the hybrid model’s superior ability to detect temporal and statistical anomalies, reducing false negatives and improving early detection of fraudulent contracts. The approach contributes a scalable and interpretable framework for real-time Ponzi detection in blockchain ecosystems. This research not only enhances the reliability of Ethereum’s financial ecosystem but also offers regulators and developers a novel tool for proactive fraud prevention. Future work could extend this framework to multi-chain detection systems and real-time forensic monitoring.
- References
- Downloads
- Published
- 15-11-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Olusola K. AKINDE, Abolaji O. ILORI, Habeeb A. ARIKEWUYO, Development of a Wearable Fall Sensing Device for Enhanced Independent Living Among the Elderly , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abba M. BALA, Abdurrauf G. SHARIFAI, Umar S. HARUNA, A Hybrid Deep Learning Model for Efficient Anomaly Detection in Video Surveillance Systems , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Oluwaseun S. OGUNGBEMI, Geophysical Approach to Groundwater Resource Appraisal in Afe Babalola University, Ado-Ekiti, Southwestern Nigeria , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Isiyaku SALEH, Yemisi E. AKINSELI, Design and Implementation of an Automatic Gate for Cars at Railway Crossings , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Lukman MOHAMMED, Victor O. WAZIRI, Ismaila IDRIS, Suleiman AHMAD, Performance Assessment of Android Antimalware Applications: An Experimental Approach , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Zainab B. LAPAI, Joseph A. OJENIYI, Ismail IDRIS, Abdulkadir O. ABDULBAKI, Jennifer BALA, Entropy-Guided Neural Architecture for Family-Level Classification of Windows Ransomware , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
