COMBATTING BANKING MALWARE THREATS: EVALUATING THE EFFICACY OF HYBRID AND SINGLE-CLASSIFICATION ALGORITHMS

Authors

  • Suleiman Dauda Kaduna State University, Kaduna
  • Muhammad Aminu Ahmad Kaduna State University, Kaduna
  • Ahmad Abubakar Aliyu Kaduna State University, Kaduna
  • Mohammed Ibrahim Kaduna State University, Kaduna
  • Sa'adatu Abdulkadir Kaduna State University, Kaduna
  • Abubakar Mu'azu Ahmed Kaduna State University, Kaduna
  • A. S. Mukhtar Kaduna State University, Kaduna
  • S. Bello

DOI:

https://doi.org/10.33003/fjs-2025-0903-3235

Keywords:

Accuracy, Banking malware, Cybersecurity, Classification algorithms, Hybrid models, Single classifiers

Abstract

The increasing sophistication and prevalence of banking malware pose significant challenges to cybersecurity, threatening the confidentiality, integrity, and availability of financial systems and user data. This study evaluates the efficacy of hybrid and single-classification algorithms in detecting banking malware, addressing a critical gap in existing research. A total of eight classification algorithms were analyzed, including three hybrid models—Stacked Ensemble with Gradient Boosting, AdaBoost, and Stacking with Decision Trees and Random Forest. Additionally, five single classifiers—Support Vector Machine (SVM), Decision Tree, k-NN, Random Forest and Logistic Regression were assessed. The research methodology incorporated principal component analysis (PCA) for feature selection and techniques like Adasyn and Tomek Link to address data imbalance. Classification performance was evaluated using key metrics: accuracy, precision, recall, and F1-score. Results demonstrated that hybrid models, particularly an ensemble combining Random Forest and Decision Tree, outperformed other classifiers, achieving superior accuracy (0.98), precision, and recall. While Gradient Boosting and AdaBoost also exhibited robust performance, Logistic Regression showed room for improvement in precision and recall metrics. This research highlights the effectiveness of hybrid classification models in enhancing the detection of banking malware and underscores their potential for strengthening cybersecurity defenses in financial systems. The study contributes to the growing literature on machine learning applications in malware detection and provides insights into the strengths and limitations of diverse classification algorithms.

References

Adanikin, Adeoye, Itunuoluwa Adanikin, Ayobami &Ariyo. (2020). COVID-19 and E-Learning: Nigeria Tertiary Education System Experience. 5. 28-31.

Adesina, R, & Ingirige, B (2019). Dismantling barriers to effective disaster management in Nigeria. 14th International Postraduate research conference 2019: Contemporary and Future Directions in the Built Environment.

Akazue I. Maureen, Geofrey A. Nwokolo, Okpako A. Ejaita, Ogeh Emmanuel Ufiofio(2023). Machine Learning Survival Analysis Model for Diabetes Mellitus. International Journal of Innovative Science and Research Technology. Vol. 8(4).

Bukhari, B. (2018). Effects of Security Protocols on Cybercrime in Ahmadu Bello University, Zaria [Academic Masters, University of KwaZulu Natal, South Africa].

Demers, G, Harrington, S, Cianci, M., & Green ,N.(2017). Protecting Colleges & Universities Against Losses in a Virtual World.. The John Marshall Journal of Information Technology & Privacy Law., 33(2),3

De Paoli, S., Johnstone, J., Coull, N., Ferguson, I., Sinclair, G., Tomkins, P., Brown, M., & Martin, R. (2020). A Qualitative Exploratory Study of the Knowledge, Forensic, and Legal Challenges from the Perspective of Police Cybercrime Specialists. Policing: A Journal of Policy and Practice.

Egbunike, N(2019). Nigerian Students face cybercrime charges for criticising their university online. https://globalvoices.org/2019/07/11/nigerian-students-face-cybercrime-charges-for-criticising-their-university-online/

G.G James, A.E Okpako, C. Ituma & J.E. Asuquo.(2022). Development of hybrid intelligent based information retrieval technique. Int J. Comput. Appl, 184(2022), 13. https://doi.org/10.5120/ijca2022922401

Hedge and Hayword (2004). The Status Information and Communication Technology (ICT) in Secondary Schools in Ondo State. (unpublished M.Ed. Thesis.).

Howard, W.R.(2009), "Schneier on Security",Kybernetes, Vol. 38 No. 9, pp. 16361637. https://doi.org/10.1108/03684920910991603

Hunton, P. (2011). A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. Digital investigation, 7(3-4), 105-113.

Krejcie, R.V., & Morgan, D.W., (1970). Determining Sample Size for Research Activities. Educational and Psychological Measurement.

Krönke, Matthias. (2020). Africa's_digital_divide_and_the_promise_of_e-learning/citations https://www.researchgate.net/publication/342165040

Li, F., Li, Z., Han, W., Wu, T., Chen, L., Guo, Y., & Chen, J. (2018). Cyberspace-oriented access control: A cyberspace characteristics-based model and its policies. IEEE Internet of Things Journal, 6(2), 1471-1483.

Mary , L.(2016). IT Security and Privacy

Mojeed, M.(2020). How Nigeria University Launched Massive Cyber attacks Against Premium Times. https://allafric.COM/STORIES/202007280025.html

Morgan, S. (2020). Cybercrime To Cost The World $10.5 Trillion Annually By 2025 Cybercrime Magazine. In. Lucky Ojobo Ogheneruemu & Okpako Abugor Ejaita(2023). An evaluation of smartphone usage and social interaction of Delta State University Students, Abraka. Journal of Information Engineering and Applications. Vol. 13(1)

Ojobo, O. L, Okpako ,A.E, Ivwighren ,H.E(2022). Covid-19 Pandemic Misinformation and Disinformation on Social Media: A study of Abraka Metropolis. Innovations, Number 70

Okpako A.E, Oghoodi D & Ako, R.E (2020). The triadic interplay of culture, globalization and cybercrime trajectory in Nigeria through a sociological lens. Researchjournali’s Journal of Computer Science.(5).4

Okpako Abugor Ejaita, Bridget O. Malasowe, F.O Mormah, & Stella C. Chiemeke (2023). Analysis of emerging Cybercrime Entrepreneurship and its implication in Nigeria. Covenant Journal of Entrepreneurship. Vol. 7(1)

Osuji Catherine U. Nwoke, Bright Ihechukwu (2019), Pre-service teachers’ perception towards role of e-learning in science education in teacher training institutions | International Journal of Science and Technology . Vol. 8(1). 40-49,2019

Sanoo, J. (2018). Cyber Security Tutorials. Retrieved 26/06/2020 from https://www.javatpoint.com/cyber-security-introduction

Soomro , T.R, & Hussain , M. (2019). Social Media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24(1), 9-17

Tabassum, L and Baker, S. (2020). Cybersecurity and Safety Measures. International Research Journal of Modernization in Engineering Technology and Science. Vol 02, Issue:06. June2020. Available at SSRN: https://ssrn.com/abstract=3641388

Taylor, L. (2017). What is data justice? The case for connecting digital rights and freedoms globally. Big Data & Society, 4(2), 2053951717736335.

U-EENI, (2022). E-learning as a disruptive innovation. U-EENI. Retrieved from http://www.u-eeni.edu.es.com

Published

2025-03-31

How to Cite

Dauda, S., Ahmad, M. A., Aliyu, A. A., Ibrahim, M., Abdulkadir, S., Ahmed, A. M., Mukhtar, A. S., & Bello, S. (2025). COMBATTING BANKING MALWARE THREATS: EVALUATING THE EFFICACY OF HYBRID AND SINGLE-CLASSIFICATION ALGORITHMS. FUDMA JOURNAL OF SCIENCES, 9(3), 284 - 293. https://doi.org/10.33003/fjs-2025-0903-3235

Most read articles by the same author(s)

<< < 1 2