Preventing Cyber-Fraud in Nigeria’s Banking System Using Fraudaeck-AI


  •   Solomon M. Ekolama

  •   Sunny Orike

  •   Promise Elechi


Preventing Cyber-Fraud in Nigeria's Banking System Using Fraudaeck-AI (Fraud analysis environment for cyber-fraud check) is an in-depth analysis of artificial intelligence (AI) assisted identity verification and authentication systems to prevent cyber fraud in Nigeria's banking system. The Fraudaeck (fraud analysis environment for cyber-fraud check) is a machine learning model developed to learn the interconnected subsystems of the communication network and the banking applications and how they function seamlessly to provide customers with ease and comfort of banking even on the go. An investigation revealed how this created a vulnerability in the system, allowing malicious software attacks such as the Xenomorph Trojan to gain access to the system, paving the way for cyber fraudsters—"Yahoo-boys"—to gain access. This paper proposes a solution to cyber-fraud during electronic banking transactions by using an artificial neural network model called Fraudaeck, which can be interfaced with both the telecommunication protocols and the banking application to detect network intrusion, customer identity theft, and prevent cyber-fraud to obtain hitch-free banking activities in Nigeria.

Keywords: Artificial Neural Network, Communication, Cyber-Attack, Cybercrime, ISP, Network; Network Intrusion.


Wikipedia. Internet service provider. 2022. [Internet]. Retrieved from:

Joshi N. Biometrics is smart, but AI is smarter Here's why. Allerin. 2019. [Internet] Retrieved from:

Okeshola FB, Adeta AK. The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research. 2013; 3(9): 98-114.

Forenbacher I, Husnjak S, Cviti? I, Jovovi? I. Determinants of mobile phone ownership in Nigeria. (2019).

Ibrahim U. The Impact of Cybercrime on the Nigerian Economy and Banking System. NDIC-Quarterly, 2019; 34(12).

Alkhalil Z, Hewage C, Nawaf L, Khan I. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science, 2021; 3.

Ogbonnaya M. Cybercrime in Nigeria demands public-private action. ISS Africa. October 19, 2020. [Internet] Retrieved from:

Awodele OM, Adelekan TA, Abodunrin J, George BS, Onosoghenerivwe O, Kajero I, Tanitoluwa O, et al. An Overview of Digital Identity and Digital Identification in Nigeria. (n.d.) Retrieved from:

Olanrewaju OM, Adebiyi FO. The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria. International Journal of Engineering Research & Technology (IJERT), 2014; 3(8).

Omodunbi BA, Odiase PO, Olaniyan OM, Esan AO. Cybercrimes in Nigeria: Analysis, Detection and Prevention. FUOYE Journal of Engineering and Technology, 2016; 1(1): 37-42.

Turan WM, Bashir MM. GSM Networks: A Review of Security Threats and Mitigation Measures. The Information Manager, 2006; 6(1&2).

Bakare BI, Ekolama SM. Preventing Man-in-the-Middle (MiTM) Attack of GSM Calls. European Journal of Electrical Engineering and Computer Science 2021; 5(4): 63-68.

Sonal, Upasna. Mobile Phone Cloning. International Journal of Engineering Research & Technology (IJERT), 2015; 3(10): 1-5, NCETEMS-2015 Conference Proceedings.

Raza M, Iqbal M, Sharif M, Haider W. A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication. World Applied Sciences Journal, 2012; 19(4): 439-444.

Li X, Dai H, Zhao Q. (2014). An Analytical Model on Eavesdropping Attacks in Wireless Networks. IEEE International Conference on Communication Systems,

Azeez NA, Irwin B. Cyber Security: Challenges and the Way Forward. GESJ: Computer Science and Telecommunications, 2010; 6(29): 56-69. Rhodes University.

World Bank Group. ID4D Country Diagnostic: Nigeria. 2016. [Internet] Retrieved from:

NIMC. Nigerian Biometric Standards Regulation. 2016 [Internet] Retrieved from:

Ahmed SI, Hoque R, Guha S, Rifat R, Dell N. Privacy, Security, and Surveillance in the Global South: A Study of Biometric Mobile SIM Registration in Bangladesh. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017: 906–918.

Dey S, Duttay A, Toledoz JI, Ghoshx SK, Llad J. SigNet: Convolutional Siamese Network for Writer Independent Offline Signature Verification. Computer Vision Center, 2017.

Rathi M. Convolutional Neural Networks. 2018. [Internet] Retrieved from:

Jadon S. An Overview of Deep Learning Architectures in Few-Shot Learning Domain. 2020. [Internet] Retrieved from:

Hu L, Zhang J, Xiang Y, Wang W. Neural Networks-Based Aerodynamic Data Modeling: A Comprehensive Review. IEEE Access, 2020; 8: 90805-90823,


Download data is not yet available.


How to Cite
Ekolama, S.M., Orike, S. and Elechi, P. 2022. Preventing Cyber-Fraud in Nigeria’s Banking System Using Fraudaeck-AI. European Journal of Electrical Engineering and Computer Science. 6, 6 (Dec. 2022), 55–63. DOI:

Most read articles by the same author(s)