skip to main content
10.1145/3573942.3574105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiprConference Proceedingsconference-collections
research-article

Full-Rotation Quantum Convolutional Neural Network for Abnormal Intrusion Detection System

Authors Info & Claims
Published:16 May 2023Publication History

ABSTRACT

Intrusion detection system (IDS) is a significant mechanism to improve network security. As a promising technique, machine learning (ML) methods has been applied in IDS to obtain high classification accuracy. However, classical ML based IDS methods hit a bottleneck in computing performance in case of huge network traffic and complex high-dimensional data. Due to the parallelism, superposition, entanglement of quantum computing, quantum computing provides a new solution to speed up the classical ML algorithms. This paper proposes a novel IDS scheme based on full-rotation quantum convolutional neural network (FR-QCNN). The key component of the FR-QCNN is the quantum convolution filter, which is composed of coding layer, variational layer and measurement layer. Different from the traditional quantum convolutional neural network, a full-rotation quantum circuit is used in the variational layer of the FR-QCNN, realizing a complete parameter update in the model training. Experiment on dataset from KDD Cup shows that the IDS classification accuracy of FR-QCNN is higher than classical ML models such as convolutional neural network (CNN), decision tree (DT) and support vector machine (SVM), as well as higher than traditional quantum convolutional neural network(QCNN). Meanwhile, FR-QCNN and QCNN have lower space complexity and time complexity than classical ML methods.

References

  1. Grover, Lov K . Fixed-Point Quantum Search[J]. Physical Review Letters, 2005, 95(15):150501.Google ScholarGoogle ScholarCross RefCross Ref
  2. Yoder T J , Low G H , Chuang I L . Fixed-Point Quantum Search with an Optimal Number of Queries[J]. Physical Review Letters, 2014, 113(21):210501.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mitchell T M . Machine Learning[M]. McGraw-Hill, 2003.Google ScholarGoogle Scholar
  4. Nooripour R , Hosseinian S , Hussain A J , How Resiliency and Hope Can Predict Stress of Covid-19 by Mediating Role of Spiritual Well-being Based on Machine Learning[J]. Journal of Religion and Health, 2021(1):1-16.Google ScholarGoogle Scholar
  5. Lloyd S , Mohseni M , Rebentrost P . Quantum principal component analysis[J]. Nature Physics, 2014, 10(9):108-113 vol. 1.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ma W P . A novel quantum neural network based on multi-level activation function[J]. Laser Physics Letters, 2021, 18(2):025201 (7pp).Google ScholarGoogle ScholarCross RefCross Ref
  7. Sukumar J , Pranav I , Neetish M M , Network Intrusion Detection Using Improved Genetic k-means Algorithm[C]// 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2018.eley.Google ScholarGoogle Scholar
  8. Boukhris I , Elouedi Z , Ajabi M . Toward intrusion detection using belief decision trees for big data[J]. Knowledge & Information Systems, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kang S , Liu L , Liu C , Intrusion detection based on multiple layer extreme learning machine[J]. Journal of Computer Applications, 2015.Google ScholarGoogle Scholar
  10. Tarek, M, Taha, Intrusion Detection Using Deep Belief Network and Extreme Learning Machine[J]. International Journal of Monitoring and Surveillance Technologies Research, 2015, 3(2):35-56.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mirza A H , Cosan S . Computer network intrusion detection using sequential LSTM Neural Networks autoencoders[C]// 2018:1-4.Google ScholarGoogle Scholar
  12. Li G. Research on Network Intrusion Detection Model Based on Quantum Artificial Fish Swarm and Fuzzy Kernel Clustering Algorithm [J]. Software Engineering, 2019, 22(06): 33-37.Google ScholarGoogle Scholar
  13. Zhang Z F. Feature Selection for Network Intrusion Detection Based on Quantum Evolutionary Algorithm [J]. Computer Applications, 2013, 33(05):1357-1361.Google ScholarGoogle ScholarCross RefCross Ref
  14. Liu X M . Research of Intrusion Detection Based on Fuzzy Clustering and the Quantum Genetic Theory[J]. Journal of Kaifeng University, 2011.Google ScholarGoogle Scholar
  15. Xu Lei, Li Yongzhong, Li Zhengjie,  Network Intrusion Detection Algorithm Based on Quantum Particle Swarm Optimization [J]. Computer Engineering and Applications, 2011, 47(36):4.Google ScholarGoogle Scholar
  16. Zz A , Dc A , Jw C , Quantum-based subgraph convolutional neural networks[J]. Pattern Recognition, 2019, 88:38-49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Killoran N , Bromley T R , Arrazola J M , Continuous-variable quantum neural networks[J]. Physical Review Research, 2019, 1(3).Google ScholarGoogle ScholarCross RefCross Ref
  18. Liu H Y , Sun T P , Wu Y C , Variational Quantum Algorithms for the Steady States of Open Quantum Systems[J]. Chinese Physics Letters, 2021, 38(8):080301 (6pp).Google ScholarGoogle ScholarCross RefCross Ref
  19. Soklakov A N , Schack R . Efficient state preparation for a register of quantum bits[J]. Phys.rev.a, 2006, 73(1):5689-5693.Google ScholarGoogle Scholar
  20. Siddiqui M K , Naahid S . Analysis of KDD CUP 99 Dataset using Clustering based Data Mining[J]. International Journal of Database Theory & Application, 2013, 6(5):23-34.Google ScholarGoogle ScholarCross RefCross Ref
  21. Mitrofanov S A , Semenkin E S . Tree retraining in the decision tree learning algorithm[J]. IOP Conference Series: Materials Science and Engineering, 2021, 1047(1):012082 (7pp).Google ScholarGoogle ScholarCross RefCross Ref
  22. Hamada K , Ikarashi D , Kikuchi R , Efficient decision tree training with new data structure for secure multi-party computation[J]. 2021.Google ScholarGoogle Scholar

Index Terms

  1. Full-Rotation Quantum Convolutional Neural Network for Abnormal Intrusion Detection System

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      AIPR '22: Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
      September 2022
      1221 pages
      ISBN:9781450396899
      DOI:10.1145/3573942

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 May 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format