Next-Generation Cybersecurity: The Role of AI and Quantum Computing in Threat Detection

Authors

  • Mitra Penmetsa University of Illinois at Springfield. Author
  • Jayakeshav Reddy Bhumireddy University of Houston. Author
  • Rajiv Chalasani Sacred Heart University. Author
  • Mukund Sai Vikram Tyagadurgam University of Illinois at Springfield. Author
  • Venkataswamy Naidu Gangineni University of Madras, Chennai. Author
  • Sriram Pabbineedi University of Central Missouri. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V2I4P106

Keywords:

Cybersecurity, Quantum Computing, Threat Detection, Cyber Threats, Quantum-Enhanced, Quantum Algorithms, operational technology (OT), information technology (IT)

Abstract

The merging of quantum computing and artificial intelligence (AI) is poised to redefine the cybersecurity landscape by allowing more sophisticated threat identification, rapid response, and adaptive defence mechanisms. This paper explores the transformative impact of AI-driven landscape by allowing more sophisticated threat identification, anomaly detection, malware classification, and behavioural analytics in cyber defence. Simultaneously, it investigates quantum computing's disruptive ability to fortify cryptographic systems while simultaneously presenting threats via quantum-based attacks like Grover's and Shor's algorithms. Emerging hybrid architectures that combine AI with quantum computing Quantum Machine Learning (QML) are examined for enhanced pattern recognition and predictive capabilities. The study concludes with a review of current research, technological challenges, and the future direction of AI-quantum integration in securing digital infrastructures against more complex online dangers.  The combination of AI's flexibility and quantum computing's processing capacity presents a viable avenue for preventive security measures as cyberattacks become more sophisticated and frequent

Downloads

Download data is not yet available.

References

[1] M. W. Omar, N. Yaqubi, and J. Ibrahim, “Educating the General Public on Cyber-security survival,” Int. J. Comput. Sci. Inf. Technol. Res., vol. 7, no. 4, pp. 100–104, 2019.

[2] D. S. Berman, A. L. Buczak, J. S. Chavis, and C. L. Corbett, “A Survey of Deep Learning Methods for Cyber Security,” Information, vol. 10, no. 4, 2019, doi: 10.3390/info10040122.

[3] V. Kolluri, “A Comprehensive Analysis On Explainable And Ethical Machine: Demystifying Advances In Artificial Intelligence,” TIJER - Int. Res. Journals, vol. 2, no. 7, pp. 2349–9249, 2015.

[4] W. Tounsi, “What is Cyber Threat Intelligence and How is it Evolving?,” 2019, pp. 1–49. doi: 10.1002/9781119618393.ch1.

[5] V. Kolluri, “A Pioneering Approach To Forensic Insights: Utilization Ai for Cybersecurity Incident Investigations,” Int. J. Res. Anal. Rev., no. May, 2016.

[6] M. Boutwell and M. A. Boutwell, “Exploring Industry Cybersecurity Strategy in Protecting Critical Walden University This is to certify that the doctoral study by,” 2019.

[7] N. Alruhaily, “Analysis and Improvements of Behaviour-Based Malware Detection Mechanisms,” no. September, 2018.

[8] V. Bhavsar, A. Kadlak, and S. Sharma, “Study on Phishing Attacks,” Int. J. Comput. Appl., vol. 182, pp. 27–29, 2018, doi: 10.5120/ijca2018918286.

[9] P. Vähäkainu and M. Lehto, “Artificial intelligence in the cyber security environment Artificial intelligence in the cyber security environment,” 14th Int. Conf. Cyber Warf. Secur. ICCWS2019At Stellenbosch, South Africa, 2019.

[10] S. Singamsetty, “Fuzzy-Optimized Lightweight Cyber-Attack Detection For Secure Edge-Based Iot Netwok.,” J. Crit. Rev., vol. 6, no. 7, 2019, doi: 10.53555/jcr.v6:i7.13156.

[11] S. Dilek, H. Cakır, and M. Aydın, “Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review,” Int. J. Artif. Intell. Appl., vol. 6, no. 1, pp. 21–39, 2015, doi: 10.5121/ijaia.2015.6102.

[12] C. Bhatt, “Improving Intrusion Detection Systems with Artificial Intelligence: A Review of Techniques and Applications,” Turkish J. Comput. Math. Educ., vol. 10, no. 2, pp. 1068–1074, 2019, doi: 10.17762/turcomat.v10i2.13627.

[13] P. Wallden and E. Kashefi, “Cyber security in the Quantum Era,” Commun. ACM, vol. 62, no. 4, pp. 120–129, 2019, doi: 10.1145/3241037.

[14] Y. Zhou, F. Ji, M. Deng, X. He, and Q. Tang, “Overview of Quantum Key Distribution,” in Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015, Paris, France: Atlantis Press, 2015. doi: 10.2991/icmmcce-15.2015.224.

[15] D. J. Bernstein and T. Lange, “Post-quantum cryptography,” 2017. doi: 10.1038/nature23461.

[16] S. Mirza and K. Ali, “Advanced Cyber Threat Detection with AI and Quantum Computing,” 2018. doi: 10.13140/RG.2.2.20707.46884.

[17] N. Mishra et al., “Quantum Machine Learning: A Review and Current Status,” 2019. doi: 10.13140/RG.2.2.22824.72964.

[18] S. Qiu, Q. Liu, S. Zhou, and C. Wu, “Review of Artificial Intelligence Adversarial Attack and Defense Technologies,” Appl. Sci., vol. 9, no. 5, 2019, doi: 10.3390/app9050909.

[19] G. Thamilarasu and S. Chawla, “Towards deep-learning-driven intrusion detection for the internet of things,” Sensors (Switzerland), 2019, doi: 10.3390/s19091977.

[20] J. Lee, J. Kim, I. Kim, and K. Han, “Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles,” IEEE Access, 2019, doi: 10.1109/ACCESS.2019.2953095.

[21] S. A. R. Shah and B. Issac, “Performance comparison of intrusion detection systems and application of machine learning to Snort system,” Futur. Gener. Comput. Syst., vol. 80, pp. 157–170, Mar. 2018, doi: 10.1016/j.future.2017.10.016.

[22] V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, “The impact of quantum computing on present cryptography,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 3, pp. 405–414, 2018, doi: 10.14569/IJACSA.2018.090354.

[23] K. Demertzis, P. Kikiras, N. Tziritas, S. L. Sanchez, and L. Iliadis, “The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence,” Big Data Cogn. Comput., 2018, doi: 10.3390/bdcc2040035.

[24] Kalla, D., & Samiuddin, V. (2020). Chatbot for medical treatment using NLTK Lib. IOSR J. Comput. Eng, 22, 12.

[25] Kuraku, S., & Kalla, D. (2020). Emotet malware a banking credentials stealer. Iosr J. Comput. Eng, 22, 31-41.

Published

2021-12-30

Issue

Section

Articles

How to Cite

1.
Penmetsa M, Bhumireddy JR, Chalasani R, Tyagadurgam MSV, Gangineni VN, Pabbineedi S. Next-Generation Cybersecurity: The Role of AI and Quantum Computing in Threat Detection. IJETCSIT [Internet]. 2021 Dec. 30 [cited 2025 Sep. 13];2(4):54-61. Available from: https://www.ijetcsit.org/index.php/ijetcsit/article/view/249

Similar Articles

31-40 of 209

You may also start an advanced similarity search for this article.