Hybrid Quantum-Classical GANs for the Generation of Adversarial Network Flows
Prateek Paudel, Nitin Jha, Abhishek Parakh, Mahadevan Subramaniam
TLDR
This paper proposes a hybrid quantum-classical GAN (QC-GAN) to generate adversarial network traffic that can bypass classical intrusion detection systems.
Key contributions
- Introduces a hybrid quantum-classical GAN (QC-GAN) for generating malicious network flows.
- Utilizes a variational quantum generator encoding latent vectors as quantum states for enhanced expressiveness.
- Tests QC-GAN generated traffic against classical IDSs (RF, CNN) to evaluate bypass capabilities.
- Analyzes hardware noise effects on quantum attacks, highlighting the need for quantum-resilient defenses.
Why it matters
This paper addresses limitations of classical GANs in generating adversarial traffic by leveraging quantum machine learning. It demonstrates how quantum-classical GANs can create advanced attacks, emphasizing the critical need for quantum-resilient intrusion detection systems.
Original Abstract
Classical generative adversarial networks (GANs) have been applied to generate adversarial network traffic capable of attacking intrusion detection systems, but they suffer from shortcomings such as the need for large amounts of high-dimensional datasets, mode collapse, and high computational overhead. In this work, we propose a hybrid quantum-classical GAN (QC-GAN) framework where a variational quantum generator is used to generate synthetic network traffic flows mimicking malicious traffic using latent representations. Instead of sampling classical noise vectors, we encode the latent vector (the hidden features) as a quantum state, which is the basis for claiming more expressive latent representations and reducing computational overhead. A classical discriminator will be trained on real-world datasets (UNSW-NB15) and the proposed QC-GAN-generated fake network flows. In this configuration, the generator aims to minimize the discriminator's ability to distinguish real from fake traffic, while the discriminator aims to maximize its classification accuracy, in an iterative manner. In our attack model, we assume that the attacker is a state actor with access to limited quantum computing power, whereas the discriminator is chosen to be classical, as will likely be the case for most end users and organizations. We test the generated flows using classical intrusion detection system (IDS) models, such as a random forest classifier and a convolutional neural network-based classifier, for their ability to bypass the detection process. This work aims to highlight the possibilities of quantum machine learning as a means of generating advanced attack flows and stress testing classical IDS. Lastly, we further evaluate how hardware-based noise affects these attacks to offer a new perspective on IDS, highlighting the need for a quantum resilient defense system.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.