Quantum-Inspired Machine Learning for Zero-Trust Cybersecurity: A Paradigm beyond Classical Intrusion Detection

Authors

  • Lamia Akter, Mohammad Majharul Islam Jabed, Ahmed Sohaib Khawer, Sharmin Ferdous, Amit Banwari Gupta

Keywords:

Quantum-Inspired Machine Learning, Zero-Trust Security, Intrusion Detection Systems, c, Quantum Algorithms, Artificial Intelligence

Abstract

The increasing sophistication of cyberattack has demonstrated the relatively ineffectiveness of traditional intrusion detection tools in dynamically and decentralized computing systems. Since organizations evolve to a zero-trust architecture, the necessity to adopt more flexible, scalable, and resilient cybersecurity-related mechanisms becomes essential. In this paper, a paradigm shift with the implementation of quantum-inspired machine learning (QIML) in zero-trust cybersecurity models is proposed. In contrast to conventional detectors that use either fixed signatures or anomaly thresholds, QIML uses concepts inspired by quantum mechanics, including feature representation based on superposition and correlation modelling based on entanglement, to provide better detection accuracy and scalability. The challenges of changing attack vectors, adversarial evasion strategies, and high-dimensional data typical of cloud, edge, and IoT environments are all dealt with in the proposed framework. The methodological focus is given to integrating QIML algorithms into the workflow of trust assessment, identity verification, and continuous monitoring in a zero-trust ecosystem. Initial data suggests that the QIML systems can lead to increased accuracy of the intrusion detection, reduce the number of false positives, and allow predictive defenses that are impractical with classical systems. Exploring the overlap between quantum computing ideas, artificial intelligence, and zero trust principles, the present study offers a visionary insight into the development of future cybersecurity systems that will go beyond the limitations of traditional machine learning practices.

DOI: https://doi.org/10.17762/ijisae.v12i20s.7862

 

Downloads

Download data is not yet available.

References

Arrazola, J. M., Delgado, A., Bardhan, B. R., & Lloyd, S. (2020). Quantum-inspired algorithms in practice. Quantum, 4, 307.https://doi.org/10.22331/q-2020-08-13-307

Bacon, D., &VAnDAm, W. (2010). Recent progress in quantum algorithms. Communications of the ACM, 53(2), 84-93.

Beloborodov, D., Ulanov, A. E., Foerster, J. N., Whiteson, S., &Lvovsky, A. I. (2020). Reinforcement learning enhanced quantum-inspired algorithm for combinatorial optimization. Machine Learning: Science and Technology, 2(2), 025009.

Chen, B., Qiao, S., Zhao, J., Liu, D., Shi, X., Lyu, M., ... & Zhai, Y. (2020). A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE internet of things journal, 8(13), 10248-10263.

Chen, L., Chen, P., & Lin, Z. (2020). Artificial Intelligence in Education: A Review. IEEE Access, 8, 75264–75278. https://doi.org/10.1109/ACCESS.2020.2988510

Chuan, T., Lv, Y., Qi, Z., Xie, L., & Guo, W. (2020, November). An implementation method of zero-trust architecture. In Journal of Physics: Conference Series (Vol. 1651, No. 1, p. 012010). IOP Publishing.

Delbene, K., Medin, M., & Murray, R. (2019). The Road to Zero Trust (Security). Defense Innovation Board, 1–10. Retrieved from https://media.defense.gov/2019/Jul/09/2002155219/-1/-1/0/DIB_THE_ROAD_TO_ZERO_TRUST_(SECURITY)_07.08.2019.PDF

Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2024). A review and comparative analysis of relevant approaches of zero trust network model. Sensors, 24(4), 1328.https://doi.org/10.3390/s24041328

Dong, D., Chen, C., Chu, J., & Tarn, T. J. (2010). Robust quantum-inspired reinforcement learning for robot navigation. IEEE/ASME transactions on mechatronics, 17(1), 86-97.

Edo, O. C., Tenebe, T., Etu, E., Ayuwu, A., Emakhu, J., & Adebiyi, S. (2022). Zero Trust Architecture: Trend and Impacton Information Security. International Journal of Emerging Technology and Advanced Engineering, 12(7), 140–147. https://doi.org/10.46338/ijetae0722_15

Eidle, D., Ni, S. Y., DeCusatis, C., & Sager, A. (2017, October). Autonomic security for zero trust networks. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 288-293). IEEE.

Fernandez De Arroyabe, I., Arranz, C. F. A., Arroyabe, M. F., & Fernandez de Arroyabe, J. C. (2023). Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers and Security, 124. https://doi.org/10.1016/j.cose.2022.102954

Fetzer, J. H. (1990). What is artificial intelligence?. In Artificial intelligence: Its scope and limits (pp. 3-27). Dordrecht: Springer Netherlands.

Haapamäki, E., & Sihvonen, J. (2019, July 15). Cybersecurity in accounting research. Managerial Auditing Journal. Emerald Group Holdings Ltd. https://doi.org/10.1108/MAJ-09-2018-2004

Jackson, P. C. (2019). Introduction to artificial intelligence. Courier Dover Publications.

Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25(12), 1595.https://doi.org/10.3390/e25121595

Khraisat, A., Gondal, I., Vamplew, P., &Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7

Lubasch, M., Joo, J., Moinier, P., Kiffner, M., & Jaksch, D. (2020). Variational quantum algorithms for nonlinear problems. Physical Review A, 101(1), 010301.

Liang, C., Shanmugam, B., Azam, S., Karim, A., Islam, A., Zamani, M., … Idris, N. B. (2020). Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics (Switzerland), 9(7), 1–27. https://doi.org/10.3390/electronics9071120

Mehraj, S., & Banday, M. T. (2020, January). Establishing a zero trust strategy in cloud computing environment. In 2020 international conference on computer communication and informatics (ICCCI) (pp. 1-6). IEEE.

Moll, N., Barkoutsos, P., Bishop, L. S., Chow, J. M., Cross, A., Egger, D. J., … Temme, K. (2018, June 19). Quantum optimization using variational algorithms on near-term quantum devices. Quantum Science and Technology. Institute of Physics Publishing. https://doi.org/10.1088/2058-9565/aab822

Peng, C., Li, Y., Cao, L., & Jiao, L. (2019, June). A surrogate model assisted quantum-inspired evolutionary algorithm for hyperparameter optimization in machine learning. In 2019 IEEE congress on evolutionary computation (CEC) (pp. 1060-1067). IEEE.

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-00318-5

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-00318-5

Sultana, M., Hossain, A., Laila, F., Taher, K. A., & Islam, M. N. (2020). Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics and Decision Making, 20(1). https://doi.org/10.1186/s12911-020-01275-y

Tang, E. (2019, June). A quantum-inspired classical algorithm for recommendation systems. In Proceedings of the 51st annual ACM SIGACT symposium on theory of computing (pp. 217-228).https://doi.org/10.1145/3313276.3316310

Tiwari, P., & Melucci, M. (2018, October). Towards a quantum-inspired framework for binary classification. In Proceedings of the 27th ACM international conference on information and knowledge management (pp. 1815-1818).https://doi.org/10.1145/3269206.3269304

Xiaopeng, T. I. A. N., & Haohao, S. O. N. G. (2021, December). A zero trust method based on BLP and BIBA model. In 2021 14th international symposium on computational intelligence and design (ISCID) (pp. 96-100). IEEE.

Yan, X., & Wang, H. (2020). Survey on Zero-Trust Network Security. In Communications in Computer and Information Science (Vol. 1252 CCIS, pp. 50–60). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-8083-3_5

Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access, 8, 23817–23837. https://doi.org/10.1109/ACCESS.2020.2968045

Downloads

Published

24.04.2024

How to Cite

Lamia Akter. (2024). Quantum-Inspired Machine Learning for Zero-Trust Cybersecurity: A Paradigm beyond Classical Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 1070–1080. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7862

Issue

Section

Research Article