A hybrid quantum ensemble learning model for malicious code detection

被引:1
|
作者
Xiong, Qibing [1 ,2 ]
Ding, Xiaodong [1 ]
Fei, Yangyang [1 ]
Zhou, Xin [1 ]
Du, Qiming [1 ]
Feng, Congcong [1 ]
Shan, Zheng [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450000, Peoples R China
[2] Henan Police Coll, Zhengzhou 450000, Peoples R China
来源
QUANTUM SCIENCE AND TECHNOLOGY | 2024年 / 9卷 / 03期
关键词
quantum computing; machine learning; hybrid quantum ensemble learning; malicious code detection;
D O I
10.1088/2058-9565/ad40cb
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum computing as a new computing model with parallel computing capability and high information carrying capacity, has attracted a lot of attention from researchers. Ensemble learning is an effective strategy often used in machine learning to improve the performance of weak classifiers. Currently, the classification performance of quantum classifiers is not satisfactory enough due to factors such as the depth of quantum circuit, quantum noise, and quantum coding method, etc. For this reason, this paper combined the ensemble learning idea and quantum classifiers to design a novel hybrid quantum machine learning model. Firstly, we run the Stacking method in classical machine learning to realize the dimensionality reduction of high-latitude data while ensuring the validity of data features. Secondly, we used the Bagging method and Bayesian hyperparameter optimization method applied to quantum support vector machine (QSVM), quantum K nearest neighbors (QKNN), variational quantum classifier (VQC). Thirdly, the voting method is used to ensemble the predict results of QSVM, QKNN, VQC as the final result. We applied the hybrid quantum ensemble machine learning model to malicious code detection. The experimental results show that the classification precision (accuracy, F1-score) of this model has been improved to 98.9% (94.5%, 94.24%). Combined with the acceleration of quantum computing and the higher precision rate, it can effectively deal with the growing trend of malicious codes, which is of great significance to cyberspace security.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [2] An ensemble framework for interpretable malicious code detection
    Cheng, Jieren
    Zheng, Jiachen
    Yu, Xiaomei
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10100 - 10117
  • [3] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [4] A modified lightweight quantum convolutional neural network for malicious code detection
    Xiong, Qibing
    Fei, Yangyang
    Du, Qiming
    Zhao, Bo
    Di, Shiqin
    Shan, Zheng
    QUANTUM SCIENCE AND TECHNOLOGY, 2025, 10 (01):
  • [5] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [6] Malicious url detection using machine learning and ensemble modeling
    Pakhare P.S.
    Krishnan S.
    Charniya N.N.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 839 - 850
  • [7] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [8] A Heterogeneous Machine Learning Ensemble Framework for Malicious Webpage Detection
    Shin, Sam-Shin
    Ji, Seung-Goo
    Hong, Sung-Sam
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [9] A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM
    Du, Jinran
    Chen, Huajun
    Zhong, Weijie
    Liu, Zhen
    Xu, Aidong
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 801 - 806
  • [10] Unknown Malicious Code Detection - Practical Issues
    Moskovitch, Robert
    Elovici, Yuval
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 145 - 152