Parameterised quantum SVM with data-driven entanglement for zero-day exploit detection

Abstract

Zero-day attacks pose a persistent threat to computing infrastructure by exploiting previously unknown software vulnerabilities that evade traditional signature-based network intrusion detection systems (NIDSs). To address this limitation, machine learning (ML) techniques offer a promising approach for enhancing anomaly detection in network traffic. This study evaluates several ML models on a labeled network traffic dataset, with a focus on zero-day attack detection. Ensemble learning methods, particularly eXtreme gradient boosting (XGBoost), achieved perfect classification, identifying all 6231 zero-day instances without false positives and maintaining efficient training and prediction times. While classical support vector machines (SVMs) performed modestly at 64% accuracy, their performance improved to 98% with the use of the borderline synthetic minority oversampling technique (SMOTE) and SMOTE + edited nearest neighbours (SMOTEENN). To explore quantum-enhanced alternatives, a quantum SVM (QSVM) is implemented using three-qubit and four-qubit quantum circuits simulated on the aer_simulator_statevector. The QSVM achieved high accuracy (99.89%) and strong F1-scores (98.95%), indicating that nonlinear quantum feature maps (QFMs) can increase sensitivity to zero-day exploit patterns. Unlike prior work that applies standard quantum kernels, this study introduces a parameterised quantum feature encoding scheme, where each classical feature is mapped using a nonlinear function tuned by a set of learnable parameters. Additionally, a sparse entanglement topology is derived from mutual information between features, ensuring a compact and data-adaptive quantum circuit that aligns with the resource constraints of noisy intermediate-scale quantum (NISQ) devices. Our contribution lies in formalising a quantum circuit design that enables scalable, expressive, and generalisable quantum architectures tailored for zero-day attack detection. This extends beyond conventional usage of QSVMs by offering a principled approach to quantum circuit construction for cybersecurity. While these findings are obtained via noiseless simulation, they provide a theoretical proof of concept for the viability of quantum ML (QML) in network security. Future work should target real quantum hardware execution and adaptive sampling techniques to assess robustness under decoherence, gate errors, and dynamic threat environments.

Description

DATA AVAILABILITY STATEMENT : The datasets can be found at the following sources, accessed on 14 August 2025: Original UGRansome dataset available at the University of Pretoria research repository, https://doi.org/10.25403/UPresearchdata.25215530.v1; Kaggle UGRansome: https://www.kaggle.com/datasets/nkongolo/ugransome-dataset; this study’s UGRansome: https://www.kaggle.com/datasets/jabulaninhlapo/ugransome-dataset-2024. The implementation of the QSVM with PQESE is available from the corresponding author upon reasonable request.

Keywords

Zero-day attacks, Intrusion detection systems, UGRansome dataset, Quantum machine learning, Synthetic minority oversampling, Machine learning, Network intrusion detection systems (NIDSs), eXtreme gradient boosting (XGBoost), Support vector machine (SVM)

Sustainable Development Goals

SDG-09: Industry, innovation and infrastructure

Citation

Nhlapo, S.J.; Mutombo, E.N.; Nkongolo, M.N.W. Parameterised Quantum SVM with Data-Driven Entanglement for Zero-Day Exploit Detection. Computers 2025, 14, 331. https://doi.org/10.3390/computers14080331.