Skip to main content

Abstract

The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an IoT environment such as Smart Home. The goal is to reduce the processing time for identifying attacks and to respond promptly to implement measures appropriate to the threat. We use Qboost, an iterative training algorithm in which a subset of weak classifiers is selected by solving a hard optimization problem in each iteration. The models were tested on a IoT Fridge dataset, characterized by a large volume of traffic with a low number of features and highly imbalanced data distribution. The results show an optimization of computational time and an improvement in detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baldassarre, M.T., Barletta, V.S., Caivano, D.: Smart program management in a smart city. In: 2018 AEIT International Annual Conference, pp. 1–6 (2018). https://doi.org/10.23919/AEIT.2018.8577379

  2. Barletta, V.S., Buono, P., Caivano, D., Dimauro, G., Pontrelli, A.: Deriving smart city security from the analysis of their technological levels: a case study. In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1–6 (2021). https://doi.org/10.1109/COINS51742.2021.9524268

  3. Barletta, V.S., Caivano, D., Dimauro, G., Nannavecchia, A., Scalera, M.: Managing a smart city integrated model through smart program management. Appl. Sci. 10(2) (2020). https://doi.org/10.3390/app10020714, http://www.mdpi.com/2076-3417/10/2/714

  4. Benioff, P.A.: The computer as a physical system: a microscopic quantum mechanical hamiltonian model of computers as represented by turing machines. Stat. Phys. 22 (1980). https://doi.org/10.1007/BF01011339

  5. D-Wave: (Accessed 29 Apr 2022). https://docs.dwavesys.com/docs/latest/_images/change.png

  6. D-Wave: D-wave leap (Accessed 29 Apr 2022). https://cloud.dwavesys.com/leap

  7. D-Wave: Qboost (Accessed 29 Apr 2022). https://github.com/dwave-examples/qboost

  8. Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse ising model. Phys. Rev. E 58, 5355–5363 (1998). https://doi.org/10.1103/PhysRevE.58.5355

    Article  Google Scholar 

  9. Loredo, R.: Quantum computing with python and IBM quantum example (2020)

    Google Scholar 

  10. Maurice, D.P.A.: Theory of electrons and protons (1930). https://doi.org/10.1098/rspa.1930.0013

    Article  Google Scholar 

  11. Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021). https://doi.org/10.1016/j.scs.2021.102994, https://www.sciencedirect.com/science/article/pii/S2210670721002808

  12. Neven, H., Denchev, V., Rose, G., Macready, W.: Qboost: large scale classifier training with adiabatic quantum optimization. J. Mach. Learn. Res. 25, 333–348 (2012)

    Google Scholar 

  13. Neven, H., Denchev, V.S., Rose, G., Macready, W.G.: Training a binary classifier with the quantum adiabatic algorithm. arXiv: Quantum Physics (2008). https://doi.org/10.48550/arXiv.0811.0416.

  14. Pattanayak S.: Quantum Machine Learning with Python. Apress, Berkeley, CA (2021). https://doi.org/10.1007/978-1-4842-6522-2

  15. Payares, E., Martinez-Santos, J.C.: Quantum machine learning for intrusion detection of distributed denial of service attacks: a comparative overview. In: OPTO (2021)

    Google Scholar 

  16. Piattini, M., Serrano, M., Perez-Castillo, R., Petersen, G., Hevia, J.L.: Toward a quantum software engineering. IT Prof. 23(1), 62–66 (2021). https://doi.org/10.1109/MITP.2020.3019522

    Article  Google Scholar 

  17. Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using GSE algorithm. In: 2014 IEEE International conference on high performance computing and communications. In: 2014 IEEE 6th International Symposium on Cyberspace Safety and Security. In: 2014 IEEE 11th International Conference on Embedded Software and System (HPCC, CSS, ICESS), pp. 1089–1096. https://doi.org/10.1109/HPCC.2014.183

  18. Schrödinger, E.: An undulatory theory of the mechanics of atoms and molecules. Phys. Rev. 28, 1049–1070 (1926). https://doi.org/10.1103/PhysRev.28.1049

    Article  Google Scholar 

  19. Wikimedia: (Accessed 29 Apr 2022). https://commons.wikimedia.org/wiki/File:Sphere_bloch.jpg

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vita Santa Barletta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Barletta, V.S., Caivano, D., De Vincentiis, M., Magrì, A., Piccinno, A. (2023). Quantum Optimization for IoT Security Detection. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds) Ambient Intelligence—Software and Applications—13th International Symposium on Ambient Intelligence. ISAmI 2022. Lecture Notes in Networks and Systems, vol 603. Springer, Cham. https://doi.org/10.1007/978-3-031-22356-3_18

Download citation

Publish with us

Policies and ethics