Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security

被引:18
作者
Kadry, Heba [1 ]
Farouk, Ahmed [2 ]
Zanaty, Elnomery A. [3 ]
Reyad, Omar [3 ]
机构
[1] Sohag Univ, Fac Sci, Dept Math & Comp Sci, Sohag, Egypt
[2] South Valley Univ, Fac Comp & Artificial Intelligence, Dept Comp Sci, Hurghada, Egypt
[3] Sohag Univ, Fac Comp & Artificial Intelligence, Dept Comp Sci, Sohag, Egypt
关键词
Intrusion Detection System; (IDS); Data Security; (QNN); Whale Optimization Algo; rithm (WOA); phy (ECC); Cuckoo Search Optimization; (CSO); Quantum Neural Network;
D O I
10.1016/j.aej.2023.03.072
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feedforward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns. (c) 2023 The Authors. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
引用
收藏
页码:491 / 500
页数:10
相关论文
共 31 条
[1]   A New Ensemble-Based Intrusion Detection System for Internet of Things [J].
Abbas, Adeel ;
Khan, Muazzam A. ;
Latif, Shahid ;
Ajaz, Maria ;
Shah, Awais Aziz ;
Ahmad, Jawad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :1805-1819
[2]   Quantum Computing Optimization Technique for IoT Platform using Modified Deep Residual Approach [J].
Abd El-Aziz, Rasha M. ;
Taloba, Ahmed I. ;
Alghamdi, Fahad A. .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) :12497-12509
[3]   State-of-the-art in artificial neural network applications: A survey [J].
Abiodun, Oludare Isaac ;
Jantan, Aman ;
Omolara, Abiodun Esther ;
Dada, Kemi Victoria ;
Mohamed, Nachaat AbdElatif ;
Arshad, Humaira .
HELIYON, 2018, 4 (11)
[4]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[5]   Optimizing connection weights in neural networks using the whale optimization algorithm [J].
Aljarah, Ibrahim ;
Faris, Hossam ;
Mirjalili, Seyedali .
SOFT COMPUTING, 2018, 22 (01) :1-15
[6]   Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks [J].
Alzahrani, Abdulsalam O. ;
Alenazi, Mohammed J. E. .
FUTURE INTERNET, 2021, 13 (05)
[7]  
Biswas S., 2018, International Journal of Pure and Applied Mathematics, V118, P101
[8]   A new hybrid approach for intrusion detection using machine learning methods [J].
Cavusoglu, Unal .
APPLIED INTELLIGENCE, 2019, 49 (07) :2735-2761
[9]   Cyber security in smart cities: A review of deep learning-based applications and case studies [J].
Chen, Dongliang ;
Wawrzynski, Pawel ;
Lv, Zhihan .
SUSTAINABLE CITIES AND SOCIETY, 2021, 66
[10]  
Chen L, 2023, Tech. Rep, DOI 10.6028