Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale w...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-05-01
|
Series: | Alexandria Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016823002430 |
_version_ | 1797854512453517312 |
---|---|
author | Heba Kadry Ahmed Farouk Elnomery A. Zanaty Omar Reyad |
author_facet | Heba Kadry Ahmed Farouk Elnomery A. Zanaty Omar Reyad |
author_sort | Heba Kadry |
collection | DOAJ |
description | Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feed-forward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns. |
first_indexed | 2024-04-09T20:08:21Z |
format | Article |
id | doaj.art-185fb5b2e08a4b8bb1563732a934e25d |
institution | Directory Open Access Journal |
issn | 1110-0168 |
language | English |
last_indexed | 2024-04-09T20:08:21Z |
publishDate | 2023-05-01 |
publisher | Elsevier |
record_format | Article |
series | Alexandria Engineering Journal |
spelling | doaj.art-185fb5b2e08a4b8bb1563732a934e25d2023-04-01T08:45:45ZengElsevierAlexandria Engineering Journal1110-01682023-05-0171491500Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data securityHeba Kadry0Ahmed Farouk1Elnomery A. Zanaty2Omar Reyad3Department of Mathematics and Computer Science, Faculty of Science, Sohag University, Sohag, Egypt; Corresponding author at: Department of Mathematics and Computer Science, Faculty of Science, Sohag University, Sohag, Egypt.Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Sohag University, Sohag, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Sohag University, Sohag, EgyptSecure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feed-forward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns.http://www.sciencedirect.com/science/article/pii/S1110016823002430Intrusion Detection System (IDS)Data SecurityQuantum Neural Network (QNN)Whale Optimization Algorithm (WOA)Elliptical Curve Cryptography (ECC)Cuckoo Search Optimization (CSO) |
spellingShingle | Heba Kadry Ahmed Farouk Elnomery A. Zanaty Omar Reyad Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security Alexandria Engineering Journal Intrusion Detection System (IDS) Data Security Quantum Neural Network (QNN) Whale Optimization Algorithm (WOA) Elliptical Curve Cryptography (ECC) Cuckoo Search Optimization (CSO) |
title | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
title_full | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
title_fullStr | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
title_full_unstemmed | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
title_short | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
title_sort | intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security |
topic | Intrusion Detection System (IDS) Data Security Quantum Neural Network (QNN) Whale Optimization Algorithm (WOA) Elliptical Curve Cryptography (ECC) Cuckoo Search Optimization (CSO) |
url | http://www.sciencedirect.com/science/article/pii/S1110016823002430 |
work_keys_str_mv | AT hebakadry intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity AT ahmedfarouk intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity AT elnomeryazanaty intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity AT omarreyad intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity |