INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 6 2024
DOI: 10.56201/ijcsmt.v10.no6.2024.pg32.58


Multi-Layered Hybrid Security Framework for Online Banking Transactions

O. Sarjiyus & I. Manga


Abstract


The concept of information security in the financial industry is not merely an organizational priority, it is a cornerstone of trust, ensuring stability and resilience of the entire economic infrastructure. The financial sector of Nigeria as a crucial pillar of the country’s economy is undergoing a transformative digital revolution. As financial institutions navigate the complex terrains of evolving cyber threats, regulatory frameworks and customer expectations, a holistic and proactive approach in information security becomes paramount. This research explores the landscape of information security in Nigeria financial sector addressing key challenges, current practices with a clear focus on emerging trends by strengthening major parameters for safety of online data transmission by seeking to examine common security challenges bedeviling transactions of bank customers with a view to protecting them from all forms of malicious tendencies and threats posed by hackers and attackers and mitigating these attacks using a multi- layered hybrid security framework. For the methodology, data elicitation is primarily done using the Key Informant Interview Method (KIIM) using seven banks namely UBA, GTB, Polaris bank, Union bank, Stanbic IBTC, First bank, Fidelity bank. The secondary method was used draw data from journal articles, lecture notes, conference papers and proceedings while the design of the new system was based on a multi-layered approach, incorporating up to five (5) security parameters in a bid to drastically reduce the challenges and threats to Internet banking. The system's model design is systematically structured to effectively capture and display key functionalities and expected attributes for optimal output. Various modeling tools, including class diagrams, activity diagrams, DFDs, and use case diagrams, are used, while the database is designed with an entity-relationship (E-R) diagram to ensure a robust framework. MATL


keywords:

Cryptography, Cyberthreats, Information Security, Smartcard, Steganography,


References:


Adee, R., &Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud
computing based on cryptography and steganography. Sensors, 22(3), 1109.
Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography:
A survey. Information Security Journal: A Global Perspective, 30(2), 63-87.
Ettiyan, R., & Geetha, V. (2023). A hybrid logistic DNA-based encryption system for securing the
Internet of Things patient monitoring systems. Healthcare Analytics, 3, 100149.
Hassija, V., Chamola, V., Agrawal, A., Goyal, A., Luong, N. C., Niyato, D., ... &Guizani, M.
(2021). Fast, reliable, and secure drone communication: A comprehensive survey. IEEE
Communications Surveys & Tutorials, 23(4), 2802-2832.
Jadhav, S. P., Balabanov, G., &Poulkov, V. (2021). Technique for Enhancing the Efficiency and
Security of Lightweight IoT Devices. In Advances in Computing and Data Sciences: 5th
International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised
Selected Papers, Part I 5 (pp. 528-537). Springer International Publishing.
Kannadhasan, S., & Nagarajan, R. (2021). Secure Framework Data Security Using Cryptography
and Steganography in Internet of Things. In Multidisciplinary Approach to Modern Digital
Steganography (pp. 258-278). IGI Global.
Pramanik, S., Ghosh, R., Ghonge, M. M., Narayan, V., Sinha, M., Pandey, D., &Samanta, D.
(2021). A novel approach using steganography and cryptography in business intelligence.
In Integration Challenges for Analytics, Business Intelligence, and Data Mining (pp. 192-
217). IGI Global.
Pritilata, & Mahmood, M. A. (2022). Strengthening Data Security Using Multi-level Cryptography
Algorithm. In Advanced Computational Paradigms and Hybrid Intelligent Computing:
Proceedings of ICACCP 2021 (pp. 315-324). Springer Singapore.
Rahman, S., Uddin, J., Zakarya, M., Hussain, H., Khan, A. A., Ahmed, A., & Haleem, M. (2023).
A Comprehensive Study of Digital Image Steganographic Techniques. IEEE Access, 11,
6770-6791.
Rathore, M. S., Poongodi, M., Saurabh, P., Lilhore, U. K., Bourouis, S., Alhakami, W., ... &
Hamdi, M. (2022). A novel trust-based security and privacy model for internet of vehicles
using encryption and steganography. Computers and Electrical Engineering, 102, 108205.
Sarjiyus, O., Baha, B. Y., &Garba, E. J. (2021). Enhanced Security Framework for Internet
Banking Services. Journal of Information Technology and Computing, 2(1), 9-29.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2020). Secret
image sharing scheme with encrypted shadow images using optimal homomorphic
encryption technique. Journal of Ambient Intelligence and Humanized Computing, 11,
1821-1833.
Verma, R. K. (2021). Exploring The Robustness Of Digital Watermarking Algorithms Based On
Transform Function And Machine Learning. Turkish Journal of Computer and
Mathematics Education (TURCOMAT), 12(11), 237-252.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo