Optimizing quantum machine learning for proactive cybersecurity

被引:0
|
作者
Rosa-Remedios, Carlos [1 ]
Caballero-Gil, Pino [1 ]
机构
[1] Univ La Laguna, Higher Sch Engn & Technol, Dept Comp Engn & Syst, Tenerife, Spain
关键词
Machine learning; Quantum machine learning; Cybersecurity; Phishing; Malware; Spam;
D O I
10.1007/s11081-024-09934-z
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The evolution of cyberattacks requires a continuous race to implement increasingly sophisticated techniques that allow us to stay ahead of cybercriminals. Thus, a relevant inverse problem in cybersecurity involves determining underlying patterns or models of possible cyber threats based on observed data. In particular, the processing of massive data combined with the application of Machine Learning methods and other techniques derived from Artificial Intelligence have so far achieved very significant advances in preventing and mitigating the impact of many cyberattacks. Given that the keyword in cybersecurity is anticipation, this work explores the possibilities of quantum computing and, in particular, of Quantum Machine Learning to have, when the quantum computing era arrives, the most optimal parameterisations to put these models into practice. Although the application of quantum technologies in a real context may still seem distant, having studies to assess the future viability of Quantum Machine Learning to identify different types of cyberattacks may be a differential element when it comes to ensuring the cybersecurity of essential services. For this reason, this work aims to use several datasets of known problems in the field of cybersecurity to evaluate the most optimal parameterisations in some known Quantum Machine Learning models, comparing the results with those obtained using classical models. After analysing the results of this study, it can be concluded that Quantum Machine Learning techniques are promising in the context of cybersecurity, giving rise to future work on a wider range of cybersecurity datasets and Quantum Machine Learning algorithms.
引用
收藏
页数:33
相关论文
共 50 条
  • [31] Machine Learning-Based Cybersecurity Framework for IoT Devices
    Arabelli, Rajeshwarrao
    Buradkar, Mrunalini
    Lakshmaji, Kotla
    Dube, Anand Prakash
    Shiba, Mary C.
    Geetha, B. T.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [32] CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection
    Hariharan, Ayush
    Gupta, Ankit
    Pal, Trisha
    ADVANCES IN INFORMATION AND COMMUNICATION, VOL 2, 2020, 1130 : 705 - 720
  • [33] Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model
    Mengash H.A.
    Alzahrani J.S.
    Eltahir M.M.
    Al-Wesabi F.N.
    Mohamed A.
    Hamza M.A.
    Marzouk R.
    Computer Systems Science and Engineering, 2023, 45 (02): : 1393 - 1407
  • [34] Machine Learning Advancements for Surveillance: Cybersecurity and Behavior Risk Forecasting
    Hashmi, Arshad
    Alotaibi, Fahad
    INTERNATIONAL JOURNAL OF MULTIPHYSICS, 2024, 18 (03) : 1055 - 1072
  • [35] Machine Learning and Big Data for Cybersecurity: Systematic Literature Review
    El Bouchtioui, En Naji
    Bentaleb, Asmae
    Abouchabaka, Jaafar
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 1, 2024, 1098 : 97 - 106
  • [36] Cybersecurity data science: an overview from machine learning perspective
    Iqbal H. Sarker
    A. S. M. Kayes
    Shahriar Badsha
    Hamed Alqahtani
    Paul Watters
    Alex Ng
    Journal of Big Data, 7
  • [37] Cybersecurity data science: an overview from machine learning perspective
    Sarker, Iqbal H.
    Kayes, A. S. M.
    Badsha, Shahriar
    Alqahtani, Hamed
    Watters, Paul
    Ng, Alex
    JOURNAL OF BIG DATA, 2020, 7 (01)
  • [38] Training a Quantum Annealing Based Restricted Boltzmann Machine on Cybersecurity Data
    Dixit, Vivek
    Selvarajan, Raja
    Aldwairi, Tamer
    Koshka, Yaroslav
    Novotny, Mark A.
    Humble, Travis S.
    Alam, Muhammad A.
    Kais, Sabre
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (03): : 417 - 428
  • [39] Cybersecurity Attack Detection Model, Using Machine Learning Techniques
    Avci, Isa
    Koca, Murat
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (07) : 29 - 44