Abstract
The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an IoT environment such as Smart Home. The goal is to reduce the processing time for identifying attacks and to respond promptly to implement measures appropriate to the threat. We use Qboost, an iterative training algorithm in which a subset of weak classifiers is selected by solving a hard optimization problem in each iteration. The models were tested on a IoT Fridge dataset, characterized by a large volume of traffic with a low number of features and highly imbalanced data distribution. The results show an optimization of computational time and an improvement in detection accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baldassarre, M.T., Barletta, V.S., Caivano, D.: Smart program management in a smart city. In: 2018 AEIT International Annual Conference, pp. 1–6 (2018). https://doi.org/10.23919/AEIT.2018.8577379
Barletta, V.S., Buono, P., Caivano, D., Dimauro, G., Pontrelli, A.: Deriving smart city security from the analysis of their technological levels: a case study. In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1–6 (2021). https://doi.org/10.1109/COINS51742.2021.9524268
Barletta, V.S., Caivano, D., Dimauro, G., Nannavecchia, A., Scalera, M.: Managing a smart city integrated model through smart program management. Appl. Sci. 10(2) (2020). https://doi.org/10.3390/app10020714, http://www.mdpi.com/2076-3417/10/2/714
Benioff, P.A.: The computer as a physical system: a microscopic quantum mechanical hamiltonian model of computers as represented by turing machines. Stat. Phys. 22 (1980). https://doi.org/10.1007/BF01011339
D-Wave: (Accessed 29 Apr 2022). https://docs.dwavesys.com/docs/latest/_images/change.png
D-Wave: D-wave leap (Accessed 29 Apr 2022). https://cloud.dwavesys.com/leap
D-Wave: Qboost (Accessed 29 Apr 2022). https://github.com/dwave-examples/qboost
Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse ising model. Phys. Rev. E 58, 5355–5363 (1998). https://doi.org/10.1103/PhysRevE.58.5355
Loredo, R.: Quantum computing with python and IBM quantum example (2020)
Maurice, D.P.A.: Theory of electrons and protons (1930). https://doi.org/10.1098/rspa.1930.0013
Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021). https://doi.org/10.1016/j.scs.2021.102994, https://www.sciencedirect.com/science/article/pii/S2210670721002808
Neven, H., Denchev, V., Rose, G., Macready, W.: Qboost: large scale classifier training with adiabatic quantum optimization. J. Mach. Learn. Res. 25, 333–348 (2012)
Neven, H., Denchev, V.S., Rose, G., Macready, W.G.: Training a binary classifier with the quantum adiabatic algorithm. arXiv: Quantum Physics (2008). https://doi.org/10.48550/arXiv.0811.0416.
Pattanayak S.: Quantum Machine Learning with Python. Apress, Berkeley, CA (2021). https://doi.org/10.1007/978-1-4842-6522-2
Payares, E., Martinez-Santos, J.C.: Quantum machine learning for intrusion detection of distributed denial of service attacks: a comparative overview. In: OPTO (2021)
Piattini, M., Serrano, M., Perez-Castillo, R., Petersen, G., Hevia, J.L.: Toward a quantum software engineering. IT Prof. 23(1), 62–66 (2021). https://doi.org/10.1109/MITP.2020.3019522
Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using GSE algorithm. In: 2014 IEEE International conference on high performance computing and communications. In: 2014 IEEE 6th International Symposium on Cyberspace Safety and Security. In: 2014 IEEE 11th International Conference on Embedded Software and System (HPCC, CSS, ICESS), pp. 1089–1096. https://doi.org/10.1109/HPCC.2014.183
Schrödinger, E.: An undulatory theory of the mechanics of atoms and molecules. Phys. Rev. 28, 1049–1070 (1926). https://doi.org/10.1103/PhysRev.28.1049
Wikimedia: (Accessed 29 Apr 2022). https://commons.wikimedia.org/wiki/File:Sphere_bloch.jpg
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Barletta, V.S., Caivano, D., De Vincentiis, M., Magrì, A., Piccinno, A. (2023). Quantum Optimization for IoT Security Detection. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds) Ambient Intelligence—Software and Applications—13th International Symposium on Ambient Intelligence. ISAmI 2022. Lecture Notes in Networks and Systems, vol 603. Springer, Cham. https://doi.org/10.1007/978-3-031-22356-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-22356-3_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22355-6
Online ISBN: 978-3-031-22356-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)