Quantum-Inspired Machine Learning for Zero-Trust Cybersecurity: A Paradigm beyond Classical Intrusion Detection
Keywords:
Quantum-Inspired Machine Learning, Zero-Trust Security, Intrusion Detection Systems, c, Quantum Algorithms, Artificial IntelligenceAbstract
The increasing sophistication of cyberattack has demonstrated the relatively ineffectiveness of traditional intrusion detection tools in dynamically and decentralized computing systems. Since organizations evolve to a zero-trust architecture, the necessity to adopt more flexible, scalable, and resilient cybersecurity-related mechanisms becomes essential. In this paper, a paradigm shift with the implementation of quantum-inspired machine learning (QIML) in zero-trust cybersecurity models is proposed. In contrast to conventional detectors that use either fixed signatures or anomaly thresholds, QIML uses concepts inspired by quantum mechanics, including feature representation based on superposition and correlation modelling based on entanglement, to provide better detection accuracy and scalability. The challenges of changing attack vectors, adversarial evasion strategies, and high-dimensional data typical of cloud, edge, and IoT environments are all dealt with in the proposed framework. The methodological focus is given to integrating QIML algorithms into the workflow of trust assessment, identity verification, and continuous monitoring in a zero-trust ecosystem. Initial data suggests that the QIML systems can lead to increased accuracy of the intrusion detection, reduce the number of false positives, and allow predictive defenses that are impractical with classical systems. Exploring the overlap between quantum computing ideas, artificial intelligence, and zero trust principles, the present study offers a visionary insight into the development of future cybersecurity systems that will go beyond the limitations of traditional machine learning practices.
DOI: https://doi.org/10.17762/ijisae.v12i20s.7862
Downloads
References
Arrazola, J. M., Delgado, A., Bardhan, B. R., & Lloyd, S. (2020). Quantum-inspired algorithms in practice. Quantum, 4, 307.https://doi.org/10.22331/q-2020-08-13-307
Bacon, D., &VAnDAm, W. (2010). Recent progress in quantum algorithms. Communications of the ACM, 53(2), 84-93.
Beloborodov, D., Ulanov, A. E., Foerster, J. N., Whiteson, S., &Lvovsky, A. I. (2020). Reinforcement learning enhanced quantum-inspired algorithm for combinatorial optimization. Machine Learning: Science and Technology, 2(2), 025009.
Chen, B., Qiao, S., Zhao, J., Liu, D., Shi, X., Lyu, M., ... & Zhai, Y. (2020). A security awareness and protection system for 5G smart healthcare based on zero-trust architecture. IEEE internet of things journal, 8(13), 10248-10263.
Chen, L., Chen, P., & Lin, Z. (2020). Artificial Intelligence in Education: A Review. IEEE Access, 8, 75264–75278. https://doi.org/10.1109/ACCESS.2020.2988510
Chuan, T., Lv, Y., Qi, Z., Xie, L., & Guo, W. (2020, November). An implementation method of zero-trust architecture. In Journal of Physics: Conference Series (Vol. 1651, No. 1, p. 012010). IOP Publishing.
Delbene, K., Medin, M., & Murray, R. (2019). The Road to Zero Trust (Security). Defense Innovation Board, 1–10. Retrieved from https://media.defense.gov/2019/Jul/09/2002155219/-1/-1/0/DIB_THE_ROAD_TO_ZERO_TRUST_(SECURITY)_07.08.2019.PDF
Dhiman, P., Saini, N., Gulzar, Y., Turaev, S., Kaur, A., Nisa, K. U., & Hamid, Y. (2024). A review and comparative analysis of relevant approaches of zero trust network model. Sensors, 24(4), 1328.https://doi.org/10.3390/s24041328
Dong, D., Chen, C., Chu, J., & Tarn, T. J. (2010). Robust quantum-inspired reinforcement learning for robot navigation. IEEE/ASME transactions on mechatronics, 17(1), 86-97.
Edo, O. C., Tenebe, T., Etu, E., Ayuwu, A., Emakhu, J., & Adebiyi, S. (2022). Zero Trust Architecture: Trend and Impacton Information Security. International Journal of Emerging Technology and Advanced Engineering, 12(7), 140–147. https://doi.org/10.46338/ijetae0722_15
Eidle, D., Ni, S. Y., DeCusatis, C., & Sager, A. (2017, October). Autonomic security for zero trust networks. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 288-293). IEEE.
Fernandez De Arroyabe, I., Arranz, C. F. A., Arroyabe, M. F., & Fernandez de Arroyabe, J. C. (2023). Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers and Security, 124. https://doi.org/10.1016/j.cose.2022.102954
Fetzer, J. H. (1990). What is artificial intelligence?. In Artificial intelligence: Its scope and limits (pp. 3-27). Dordrecht: Springer Netherlands.
Haapamäki, E., & Sihvonen, J. (2019, July 15). Cybersecurity in accounting research. Managerial Auditing Journal. Emerald Group Holdings Ltd. https://doi.org/10.1108/MAJ-09-2018-2004
Jackson, P. C. (2019). Introduction to artificial intelligence. Courier Dover Publications.
Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25(12), 1595.https://doi.org/10.3390/e25121595
Khraisat, A., Gondal, I., Vamplew, P., &Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1). https://doi.org/10.1186/s42400-019-0038-7
Lubasch, M., Joo, J., Moinier, P., Kiffner, M., & Jaksch, D. (2020). Variational quantum algorithms for nonlinear problems. Physical Review A, 101(1), 010301.
Liang, C., Shanmugam, B., Azam, S., Karim, A., Islam, A., Zamani, M., … Idris, N. B. (2020). Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics (Switzerland), 9(7), 1–27. https://doi.org/10.3390/electronics9071120
Mehraj, S., & Banday, M. T. (2020, January). Establishing a zero trust strategy in cloud computing environment. In 2020 international conference on computer communication and informatics (ICCCI) (pp. 1-6). IEEE.
Moll, N., Barkoutsos, P., Bishop, L. S., Chow, J. M., Cross, A., Egger, D. J., … Temme, K. (2018, June 19). Quantum optimization using variational algorithms on near-term quantum devices. Quantum Science and Technology. Institute of Physics Publishing. https://doi.org/10.1088/2058-9565/aab822
Peng, C., Li, Y., Cao, L., & Jiao, L. (2019, June). A surrogate model assisted quantum-inspired evolutionary algorithm for hyperparameter optimization in machine learning. In 2019 IEEE congress on evolutionary computation (CEC) (pp. 1060-1067). IEEE.
Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-00318-5
Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data, 7(1). https://doi.org/10.1186/s40537-020-00318-5
Sultana, M., Hossain, A., Laila, F., Taher, K. A., & Islam, M. N. (2020). Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics and Decision Making, 20(1). https://doi.org/10.1186/s12911-020-01275-y
Tang, E. (2019, June). A quantum-inspired classical algorithm for recommendation systems. In Proceedings of the 51st annual ACM SIGACT symposium on theory of computing (pp. 217-228).https://doi.org/10.1145/3313276.3316310
Tiwari, P., & Melucci, M. (2018, October). Towards a quantum-inspired framework for binary classification. In Proceedings of the 27th ACM international conference on information and knowledge management (pp. 1815-1818).https://doi.org/10.1145/3269206.3269304
Xiaopeng, T. I. A. N., & Haohao, S. O. N. G. (2021, December). A zero trust method based on BLP and BIBA model. In 2021 14th international symposium on computational intelligence and design (ISCID) (pp. 96-100). IEEE.
Yan, X., & Wang, H. (2020). Survey on Zero-Trust Network Security. In Communications in Computer and Information Science (Vol. 1252 CCIS, pp. 50–60). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-8083-3_5
Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence capabilities to improve cybersecurity. IEEE Access, 8, 23817–23837. https://doi.org/10.1109/ACCESS.2020.2968045
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.