ADAPTIVE RISK-BASED MULTI-LAYER AUTHENTICATION FRAMEWORK FOR SECURE ONLINE BANKING SYSTEMS

Authors

  • Jumoke Soyemi The Federal Polytechnic, Ilaro
  • Mudasiru Hammed The Federal Polytechnic, Ilaro
  • Olugbenga Babajide Soyemi jidesoyemi@federalpolyilaro.edu.ng

DOI:

https://doi.org/10.33003/fjs-2026-1004-4870

Keywords:

Adaptive authentication, Cybersecurity, Fraud detection, Multi-factor authentication, Online banking security, Risk-based authentication

Abstract

Digital banking services have grown rapidly, increasing exposure to credential theft, phishing, replay attacks, and account takeover fraud. Traditional, single-factor, and static multi-factor authentication systems are still susceptible in the event that attackers breach one or more levels of authentication. This paper presents and experimentally confirms an adaptive risk-based multi-layer authentication system adapted to an online banking context. The model integrates knowledge-based verification (PIN), recognition-based graphical authentication, possession-based one-time password (OTP), and a dynamic risk-scoring engine that adjusts authentication strictness based on contextual indicators such as login location, device profile, and behavioral anomalies. A probabilistic security model is designed to measure the likelihood of attack success, measured by independent authentication layers. The framework was tested in the web-based prototype environment and tested with 120 participants who underwent 500 total authentication attempts, and with simulated adversarial conditions. False Acceptance Rate (FAR), False Rejection Rate (FRR), Equal Error rate (EER), Area Under the ROC Curve (AUC), Precision, recall, and response time were used to measure the performance. The presented adaptive framework demonstrated a high authentication rate of 98.9, FAR of 0.7, FRR of 2.6, and EER of 1.65, which is considerably higher than single-factor and fixed two-factor baselines. The ROC analysis had an AUC equal to 0.991, which implies that it has a high discrimination ability. These results indicate that risk-adaptive authentication has a higher resilience to fraud and can still be operated effectively.

References

Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In 2009 IEEE/ACS international conference on computer systems and applications (pp. 641-644). IEEE.

Anwar, N. M., Ahmad, S. S. S., Kausar, N., Stević, Ž., & Gaba, Y. U. (2025). Multiple biometric authentication for online banking system based on multiple fuzzy approach. Scientific Reports, 15(1), 32824.

Bhargav-Spantzel, A., Squicciarini, A., & Bertino, E. (2007). Establishing and protecting digital identity in federation systems. Journal of Computer Security, 14(3), 269–300.

Biddle, R., Chiasson, S., & Van Oorschot, P. (2012). Graphical passwords: Learning from the first twelve years. ACM Computing Surveys, 44(4), 1–41.

Bonneau, J., Herley, C., Van Oorschot, P. C., & Stajano, F. (2012, May). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In 2012 IEEE symposium on security and privacy (pp. 553-567). IEEE.

Carjuman, N., Fook, L. C., & Hlaing, Z. C. (2025, November). Enhanced MFA Framework Against Modern Security Threats. In Proceedings of the 2025 10th International Conference on Cloud Computing and Internet of Things (pp. 148-155).

Claessens, J., Dem, V., De Cock, D., Preneel, B., & Vandewalle, J. (2002). On the security of today’s online electronic banking systems. Computers & Security, 21(3), 253–265.

Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014, February). The tangled web of password reuse. In Network and Distributed System Security Symposium (NDSS) (Vol. 14, No. 2014, pp. 23-26).

Florêncio, D., & Herley, C. (2007). A large-scale study of web password habits. Proceedings of the World Wide Web Conference, 657–666.

Freeman, D., Jain, S., Dürmuth, M., Biggio, B., & Giacinto, G. (2016, February). Who Are You? A Statistical Approach to Measuring User Authenticity. In Network and Distributed System Security Symposium (NDSS) (Vol. 16, pp. 21-24).

Ghiyamipour, F. (2021). Secure graphical password based on cued click points using fuzzy logic. Security and Privacy, 4(2), e140.

Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines: Authentication and lifecycle management (NIST SP 800-63B). National Institute of Standards and Technology.NIST special publication, 800, 63-3.

Herley, C., & Van Oorschot, P. (2012). A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1), 28–36.

Jain, A., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.

Kandula, S. R., Kassetty, N., ALANG, K. S., & Pandey, P. (2024). Context-aware multi-factor authentication in zero trust architecture: Enhancing security through adaptive authentication. International Journal of Global Innovations and Solutions (IJGIS).

Oduguwa, T., & Arabo, A. (2024). Passwordless authentication using cryptography, steganography, and biometrics. Journal of Cybersecurity and Privacy. 4(2), 278-297.

Ometov, A., Bezzateev, S., Mäkitalo, N., et al. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1–37.

Podapati, V. H., Nigam, D., & Das, S. (2025, July). SoK: a systematic review of context-and behavior-aware adaptive authentication in mobile environments. In International Symposium on Human Aspects of Information Security and Assurance (pp. 406-419). Cham: Springer Nature Switzerland.

Raghu, N., Bhat, R., Nambiar, P. R., Shetty, G. S., & DB, A. K. (2025). Blockchain-enhanced GAN image encryption scheme for cloud computing. In Intelligent Systems and IoT Applications in Clinical Health (pp. 367-392). IGI Global.

Saadi, Z. M., Sadiq, A. T., Akif, O. Z., & Farhan, A. K. (2024). Security vulnerabilities and protective strategies for graphical passwords. Electronics, 13(15), 3042

Traore, I., Woungang, I., Nakkabi, Y., Obaidat, M. S., Ahmed, A. A. E., & Khalilian, B. (2012). Dynamic sample size detection in learning command line sequence for continuous authentication. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 42(5), 1343-1356.

Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., & Memon, N. (2005). PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies, 63(1–2), 102–127.

Architecture of the Adaptive Risk-Based Multi-Layer Authentication Framework

Downloads

Published

26-02-2026

How to Cite

Soyemi, J., Hammed, M., & Soyemi, O. B. (2026). ADAPTIVE RISK-BASED MULTI-LAYER AUTHENTICATION FRAMEWORK FOR SECURE ONLINE BANKING SYSTEMS. FUDMA JOURNAL OF SCIENCES, 10(4), 331-338. https://doi.org/10.33003/fjs-2026-1004-4870