TY - JOUR
T1 - Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
AU - Kadry, Heba
AU - Farouk, Ahmed
AU - Zanaty, Elnomery A.
AU - Reyad, Omar
N1 - Publisher Copyright:
© 2023 Faculty of Engineering, Alexandria University
PY - 2023/5/15
Y1 - 2023/5/15
N2 - Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feedforward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns. (c) 2023 The Authors. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
AB - Secure data transmission in wireless mesh networks is a necessary attribute for machine learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse effect on the system's computing efficiency. In order to accurately detect an attack and enable data protection, Whale with Cuckoo search optimization (WCSO) based quantum neural network (QNN) and elliptical curve cryptography (ECC) is presented. Whale optimization algorithm (WOA) is used to choose the features in the network data that aid in precisely detecting intrusions. To identify attacks, the optimized quantum network which combines the WOA approach with the feedforward and backpropagation algorithms, is used. Sensitive data retrieving requires an encryption procedure that is enabled by the ECC algorithm, which could safely save the data files in the server, in order to, secure the documentation with security measures. In the event that the data owner maintains sensitive data on a server, the document is encrypted using the encryption method. To determine the best key optimized ECC is used. The QNN with WOA-based IDS framework is a solid option for real-time intrusion detection analysis with high accuracy of 98.5%. Thus, the study has demonstrated that the suggested effort will also provide better secure data storage, resolving security concerns. (c) 2023 The Authors. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
KW - (cso)
KW - (ids)
KW - (qnn)
KW - Cuckoo Search Optimization
KW - Data Security
KW - Intrusion Detection System
KW - Quantum Neural Network
KW - Whale Optimization Algo
KW - phy (ECC)
KW - rithm (WOA)
UR - http://www.scopus.com/inward/record.url?scp=85151274166&partnerID=8YFLogxK
U2 - 10.1016/j.aej.2023.03.072
DO - 10.1016/j.aej.2023.03.072
M3 - Article
AN - SCOPUS:85151274166
SN - 1110-0168
VL - 71
SP - 491
EP - 500
JO - Alexandria Engineering Journal
JF - Alexandria Engineering Journal
ER -