An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection

被引:1
作者
Kadi, Adam [1 ,2 ]
Selamnia, Aymene [1 ,2 ]
El Houda, Zakaria Abou [1 ]
Moudoud, Hajar [3 ]
Brik, Bouziane [4 ]
Khoukhi, Lyes [4 ]
机构
[1] Univ Quebec, UMR INRS UQO, INRS EMT, Gatineau, PQ J8Y 3G5, Canada
[2] Normandy Univ, GREYC CNRS, ENSICAEN, F-14000 Caen, France
[3] Univ Quebec Outaouais, Dept informat & ingenierie, Gatineau, PQ J8X 3X7, Canada
[4] Univ Sharjah, Coll Comp & Informat, Dept Comp Sci, Sharjah, U Arab Emirates
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2025年 / 6卷
关键词
Encoding; Quantum computing; Qubit; Accuracy; Quantum entanglement; Internet of Things; Computational modeling; Network intrusion detection; Computer crime; Training; Quantum machine learning; quantum-classical encoding; intrusion detection system;
D O I
10.1109/OJCOMS.2025.3537957
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seamlessly integrates the computational power of quantum computing with the adaptability of machine learning, offering an innovative approach to solving intricate and high-dimensional challenges. A key factor in QML's performance is the method used to encode classical data into quantum states, as it defines how data is represented and processed in quantum circuits. QML offers promising advances for IDS, particularly through hybrid quantum-classical models. This study presents an in-depth comparative analysis of quantum-classical data encoding techniques for QML-based IDS. To the best of our knowledge, this is the first study to comprehensively evaluate the performance impact of different quantum encoding methods and provide a thorough evaluation of their impacts on the overall model performances. To achieve this, we first present a comprehensive evaluation of quantum and classical data encoding techniques, focusing on four key encoding techniques namely, Amplitude Embedding, Angle Embedding, Instantaneous Quantum Polynomial (IQP) Encoding, and Quantum Approximate Optimization Algorithm (QAOA) Embedding. Then, we develop a hybrid quantum-classical QML model to analyze how each encoding affects classification performance for malicious traffic. Finally, we conduct extensive experiments using two well-known, real-world network attack datasets to assess the accuracy and efficiency of each encoding approach. Our obtained results show notable differences in classification accuracy, underscoring the importance of encoding choice in optimizing QML-based IDS. This study aims to advance the application of quantum methodologies in network security by identifying effective encoding strategies for intrusion detection.
引用
收藏
页码:1129 / 1148
页数:20
相关论文
共 49 条
[11]   Machine learning and the physical sciences [J].
Carleo, Giuseppe ;
Cirac, Ignacio ;
Cranmer, Kyle ;
Daudet, Laurent ;
Schuld, Maria ;
Tishby, Naftali ;
Vogt-Maranto, Leslie ;
Zdeborova, Lenka .
REVIEWS OF MODERN PHYSICS, 2019, 91 (04)
[12]   Generalization in quantum machine learning from few training data [J].
Caro, Matthias C. ;
Huang, Hsin-Yuan ;
Cerezo, M. ;
Sharma, Kunal ;
Sornborger, Andrew ;
Cincio, Lukasz ;
Coles, Patrick J. .
NATURE COMMUNICATIONS, 2022, 13 (01)
[13]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[14]   Quantum approximate optimization via learning-based adaptive optimization [J].
Cheng, Lixue ;
Chen, Yu-Qin ;
Zhang, Shi-Xin ;
Zhang, Shengyu .
COMMUNICATIONS PHYSICS, 2024, 7 (01)
[15]   Quantum machine learning: a classical perspective [J].
Ciliberto, Carlo ;
Herbster, Mark ;
Ialongo, Alessandro Davide ;
Pontil, Massimiliano ;
Rocchetto, Andrea ;
Severini, Simone ;
Wossnig, Leonard .
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2018, 474 (2209)
[16]   Experimental Review of Neural-Based Approaches for Network Intrusion Management [J].
Di Mauro, Mario ;
Galatro, Giovanni ;
Liotta, Antonio .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :2480-2495
[17]   A MEC-Based Architecture to Secure IoT Applications using Federated Deep Learning [J].
El Houda Z.A. ;
Brik B. ;
Ksentini A. ;
Khoukhi L. .
IEEE Internet of Things Magazine, 2023, 6 (01) :60-63
[18]   Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Hamouda, Djallel ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE ACCESS, 2022, 10 :40281-40306
[19]   Analysis of Machine Learning Classifiers for Early Detection of DDoS Attacks on IoT Devices [J].
Gaur, Vimal ;
Kumar, Rajneesh .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1353-1374
[20]   Analysis of variance - Why it is more important than ever [J].
Gelman, A .
ANNALS OF STATISTICS, 2005, 33 (01) :1-31