Improvement of Quantum Genetic Algorithms and Application of DDoS Attack Detection

Aiming at the problem of insufficient searching ability of Quantum Genetic Algorithms (QGA), this paper proposes a method to improve QGA by dynamically changing the rotation angle of quantum revolving gates. Thirteen typical standard functions are used to test the improved QGA, and to further verify the improved QGA. In this paper, a DDoS attack detection model based on quantum genetic optimization BP neural network (DQGA-BP) is constructed. The model combines improved quantum genetic algorithm with BP neural network, and uses KDD-Cup 1999 data set (9-week network connection collected from the USAF LAN) to detect DDoS attacks. It effectively improves the accuracy of DDoS attack detection. The experimental results show that the improved quantum genetic algorithm has faster convergence speed and stronger optimization ability. Under DDoS attack detection, the average detection rate of DQGA-BP is 0.51491% higher than that of the original quantum genetic optimization BP neural network (QGA-BP), and the average false alarm rate is 0.37%.

[1]  Karel Mittig,et al.  Intrusion Detection Method , 2011 .

[2]  Vijander Singh,et al.  A novel nature-inspired algorithm for optimization: Squirrel search algorithm , 2019, Swarm Evol. Comput..

[3]  F. Shang,et al.  Double Chains Quantum Genetic Algorithm with Application in Training of Process Neural Networks , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[4]  Zhiyuan Wu,et al.  Quantum rotation gate in quantum-inspired evolutionary algorithm: A review, analysis and comparison study , 2018, Swarm Evol. Comput..

[5]  R. S. Pavithr,et al.  Quantum Inspired Social Evolution (QSE) algorithm for 0-1 knapsack problem , 2016, Swarm Evol. Comput..

[6]  Zou Xi-hua,et al.  A Novel Improved Quantum Genetic Algorithm for Combinatorial Optimization Problems , 2007 .

[7]  N. Jeyanthi,et al.  Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP , 2013, Int. J. Commun. Networks Distributed Syst..

[8]  Zhao Guo-feng Detecting application-layer DDoS attack based on analysis of users' behaviors , 2011 .

[9]  Jian Guo,et al.  An Improved Quantum Genetic Algorithm , 2009, 2009 Third International Conference on Genetic and Evolutionary Computing.

[10]  Jian Cao,et al.  Quantum novel genetic algorithm based on parallel subpopulation computing and its application , 2014, Artificial Intelligence Review.

[11]  Deng Da-yong Clustering Algorithm Based on Improved Quantum Genetic Algorithm , 2013 .

[12]  Mikio Nakahara,et al.  A quantum genetic algorithm with quantum crossover and mutation operations , 2012, Quantum Inf. Process..

[13]  Guo Yun-ta Improved Quantum Genetic Algorithm for the Resource Constrained Multi-Project Scheduling Problem with Transfer Times , 2014 .

[14]  Jong-Hwan Kim,et al.  Genetic quantum algorithm and its application to combinatorial optimization problem , 2000, Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No.00TH8512).

[15]  Supranamaya Ranjan,et al.  DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.

[16]  Liu Xiao-bin Flexible job shop scheduling based on double chains quantum genetic algorithm , 2015 .

[17]  S. R. Devi,et al.  An effective approach to counter application layer DDoS attacks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[18]  Ajit Narayanan,et al.  Quantum-inspired genetic algorithms , 1996, Proceedings of IEEE International Conference on Evolutionary Computation.

[19]  Jin Wang,et al.  A new relative entropy based app-DDoS detection method , 2010, The IEEE symposium on Computers and Communications.

[20]  Wang Feng Method of Detecting Application-Layer DDoS Based on the Out-Linking Behavior of Web Community , 2013 .

[21]  Sun We Application layer DDoS defense model based on user loyalty , 2015 .

[22]  Xu Yang,et al.  Research on network intrusion detection based on PCA PSO-BP , 2016 .