Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications
نویسندگان
چکیده
This letter proposes a novel malicious user prediction model based on quantum machine learning that estimates the vicious entity present in communication system precedently before allocating data distributed environments. The proposed scrutinizes behavior of each and probable breaches using developed predictor unit. computes essential scores associated with request for process unit by generating training samples. exploits computational behavioral properties Qubits Quantum gates accurate high precision to grant access non-malicious requests only. experimental evaluation comparison state-of-the-art methods reveal it significantly improves security up 33.28%.
منابع مشابه
Machine Learning Classification of Malicious Network Traffic
1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They are used by corporations to store proprietary and other sensitive data, by families to store financial and personal information, by universities to keep research data and ideas, and by governments to store defense and security information. It is very important that the information systems that house this ...
متن کاملSLA Violation Prediction In Cloud Computing: A Machine Learning Perspective
Service level agreement (SLA) is an essential part of cloud systems to ensure maximum availability of services for customers. With a violation of SLA, the provider has to pay penalties. Thus, being able to predict SLA violations favors both the customers and the providers. In this paper, we explore two machine learning models: Naive Bayes and Random Forest Classifiers to predict SLA violations....
متن کاملMalicious JavaScript detection using machine learning
JavaScript has become a ubiquitous Web technology that enables interactive and dynamic Web sites. The widespread adoption, along with some of its properties allowing authors to easily obfuscate their code, make JavaScript an interesting venue for malware authors. In this survey paper, we discuss some of the difficulties in dealing with malicious JavaScript code, and go through some recent appro...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملApplying Machine Learning Techniques for Detection of Malicious Code in Network Traffic
The Early Detection, Alert and Response (eDare) system is aimed at purifying Web traffic propagating via the premises of Network Service Providers (NSP) from malicious code. To achieve this goal, the system employs powerful network traffic scanners capable of cleaning traffic from known malicious code. The remaining traffic is monitored and Machine Learning (ML) algorithms are invoked in an att...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE networking letters
سال: 2022
ISSN: ['2576-3156']
DOI: https://doi.org/10.1109/lnet.2022.3200724