Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security

Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale w...

Full description

Bibliographic Details
Main Authors: Heba Kadry, Ahmed Farouk, Elnomery A. Zanaty, Omar Reyad
Format: Article
Language:English
Published: Elsevier 2023-05-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110016823002430
_version_ 1797854512453517312
author Heba Kadry
Ahmed Farouk
Elnomery A. Zanaty
Omar Reyad
author_facet Heba Kadry
Ahmed Farouk
Elnomery A. Zanaty
Omar Reyad
author_sort Heba Kadry
collection DOAJ
description Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feed-forward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns.
first_indexed 2024-04-09T20:08:21Z
format Article
id doaj.art-185fb5b2e08a4b8bb1563732a934e25d
institution Directory Open Access Journal
issn 1110-0168
language English
last_indexed 2024-04-09T20:08:21Z
publishDate 2023-05-01
publisher Elsevier
record_format Article
series Alexandria Engineering Journal
spelling doaj.art-185fb5b2e08a4b8bb1563732a934e25d2023-04-01T08:45:45ZengElsevierAlexandria Engineering Journal1110-01682023-05-0171491500Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data securityHeba Kadry0Ahmed Farouk1Elnomery A. Zanaty2Omar Reyad3Department of Mathematics and Computer Science, Faculty of Science, Sohag University, Sohag, Egypt; Corresponding author at: Department of Mathematics and Computer Science, Faculty of Science, Sohag University, Sohag, Egypt.Department of Computer Science, Faculty of Computers and Artificial Intelligence, South Valley University, Hurghada, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Sohag University, Sohag, EgyptDepartment of Computer Science, Faculty of Computers and Artificial Intelligence, Sohag University, Sohag, EgyptSecure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feed-forward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns.http://www.sciencedirect.com/science/article/pii/S1110016823002430Intrusion Detection System (IDS)Data SecurityQuantum Neural Network (QNN)Whale Optimization Algorithm (WOA)Elliptical Curve Cryptography (ECC)Cuckoo Search Optimization (CSO)
spellingShingle Heba Kadry
Ahmed Farouk
Elnomery A. Zanaty
Omar Reyad
Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
Alexandria Engineering Journal
Intrusion Detection System (IDS)
Data Security
Quantum Neural Network (QNN)
Whale Optimization Algorithm (WOA)
Elliptical Curve Cryptography (ECC)
Cuckoo Search Optimization (CSO)
title Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
title_full Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
title_fullStr Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
title_full_unstemmed Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
title_short Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
title_sort intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
topic Intrusion Detection System (IDS)
Data Security
Quantum Neural Network (QNN)
Whale Optimization Algorithm (WOA)
Elliptical Curve Cryptography (ECC)
Cuckoo Search Optimization (CSO)
url http://www.sciencedirect.com/science/article/pii/S1110016823002430
work_keys_str_mv AT hebakadry intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity
AT ahmedfarouk intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity
AT elnomeryazanaty intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity
AT omarreyad intrusiondetectionmodelusingoptimizedquantumneuralnetworkandellipticalcurvecryptographyfordatasecurity