Security intrusion detection using quantum machine learning techniques

被引:0
|
作者
Maxim Kalinin
Vasiliy Krundyshev
机构
[1] Peter the Great St.Petersburg Polytechnic University,
关键词
Big data; Intrusion detection; Stream dataset; Quantum machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
Conventional machine learning approaches applied for the security intrusion detection degrades in case of big data input (106\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$10^6$$\end{document} and more samples in a dataset). Model training and computing by traditional machine learning executed on big data at a common computing environment may produce accurate outputs but take a long time, or produce poor accuracy by quick training, both disparate to malicious activity. The paper observes the quantum machine learning (QML) methods overcoming the barriers of big data and the computing abilities of common hardware for the purpose of high performance intrusion detection. Quantum support vector machine (QSVM) and quantum convolution neural network (QCNN) as concurrent methods are discussed and evaluated comparing to the conventional intrusion detectors running on the traditional computer. The QML-based intrusion detection utilizes our own dataset that implements the grouping of the network packets into the input streams eatable for the QML. We have developed the software solution that encodes the network traffic streams ready to the quantum computing. Experimental results show the ability of the QML-based intrusion detection for processing big data inputs with high accuracy (98%) providing a twice faster speed comparing to the conventional machine learning algorithms utilized for the same task.
引用
收藏
页码:125 / 136
页数:11
相关论文
共 50 条
  • [41] Comparative study of supervised machine learning techniques for intrusion detection
    Gharibian, Farnaz
    Ghorbani, Ali A.
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 350 - +
  • [42] Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 419 - 428
  • [43] Real-Time Hybrid Intrusion Detection System Using Machine Learning Techniques
    Dutt, Inadyuti
    Borah, Samarjeet
    Maitra, Indra Kanta
    Bhowmik, Kuharan
    Maity, Ayindrilla
    Das, Suvosmita
    [J]. ADVANCES IN COMMUNICATION, DEVICES AND NETWORKING, 2018, 462 : 885 - 894
  • [44] Internet of things and intrusion detection fog computing architectures using machine learning techniques
    Helal, Maha
    Kashmeery, Tariq
    Zakariah, Mohammed
    Shishah, Wesam
    [J]. DECISION SCIENCE LETTERS, 2024, 13 (04) : 767 - 782
  • [45] Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
    Aljamal, Ibraheem
    Tekeoglu, Ali
    Bekiroglu, Korkut
    Sengupta, Saumendra
    [J]. 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 2019, : 84 - 89
  • [46] Design and Development of an Efficient Network Intrusion Detection System Using Machine Learning Techniques
    Rincy, Thomas N.
    Gupta, Roopam
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [47] Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
    Bindra, Naveen
    Sood, Manu
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (05) : 419 - 428
  • [48] Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques
    Gaber T.
    Awotunde J.B.
    Folorunso S.O.
    Ajagbe S.A.
    Eldesouky E.
    [J]. Wireless Communications and Mobile Computing, 2023, 2023
  • [49] Performance Evaluation of Some Machine Learning Algorithms for Security Intrusion Detection
    Elaeraj, Ouafae
    Leghris, Cherkaoui
    Renault, Eric
    [J]. MACHINE LEARNING FOR NETWORKING, MLN 2020, 2021, 12629 : 154 - 166
  • [50] IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model
    Sarker, Iqbal H.
    Abushark, Yoosef B.
    Alsolami, Fawaz
    Khan, Asif Irshad
    [J]. SYMMETRY-BASEL, 2020, 12 (05):