Content area
A typical Software-Defined Vehicular Network (SDVN) is open to various cyberattacks because of its centralized controller-based framework. A cyberattack, such as a Distributed Denial of Service (DDoS) attack, can easily overload the central SDVN controller. Thus, we require a functional DDoS attack recognition system that can differentiate malicious traffic from normal data traffic. The proposed architecture comprises hybrid Classical-Quantum Machine Learning (QML) methods for detecting DDoS threats. In this work, we have considered three different QML methods, such as Classical-Quantum Neural Networks (C-QNN), Classical-Quantum Boltzmann Machines (C-QBM), and Classical-Quantum K-Means Clustering (C-QKM). Emulations were conducted using a custom-built vehicular network with random movements and varying speeds between 0 and 100 kmph. Also, the performance of these QML methods was analyzed for two different datasets. The results obtained show that the hybrid Classical-Quantum Neural Network (C-QNN) method exhibited better performance in comparison with the other two models. The proposed hybrid C-QNN model achieved an accuracy of 99% and 90% for the UNB-CIC-DDoS dataset and Kaggle DDoS dataset, respectively. The hybrid C-QNN model combines PennyLane’s quantum circuits with traditional methods, whereas the Classical-Quantum Boltzmann Machine (C-QBM) leverages quantum probability distributions for identifying anomalies.
Full text
1. Introduction
Amid numerous key vehicular communication technologies, the success of integrating Software Defined Networking (SDN) with Vehicular Ad Hoc Networks (VANETs) to form SDVN has helped achieve improved management, reliability, and flexibility in policy implementation. SDVN has now become an integral part of large-scale vehicular networks. Despite their obvious advantages, unlike conventional VANETs, SDVNs’ integrity and security concerns remain unaddressed, especially for their centralized network intelligence. Also, the centralized placement of the main controller required for complete network management contributes to a weak spot of failure, and if the central controller is compromised, then it may lead to chaos in the network [1,2]. SDVNs are open to various cyberattacks, including sniffing, DoS, and impersonation, among others [3,4]. The main issue is that DDoS attacks have the potential to seriously impair communication between vehicles, slowing down the transmission of data, lowering available bandwidth, and limiting effective information sharing amongst vehicles [5,6].
QML is a recent scientific sub-discipline that integrates the features of quantum computing with machine learning theory [7]. To address these critical security challenges, this study explores QML, leveraging quantum computing to tackle intricate issues. A subclass of variational quantum algorithms, QNNs are made up of quantum circuits with parameterized gate operations. A feature map or state preparation procedure is considered to first encode information into a quantum state [8]. In particular, we focus on developing an intrusion detection system with C-QNNs, which are well suited for classification tasks due to their potential to handle data concurrently through quantum mechanics principles.
Our proposed system shows impressive results. The proposed hybrid technique achieved an accuracy of 99% and 90%, demonstrating its potential to accurately identify threats. This research also highlights the benefits of using platforms like PennyLane [9], which allow researchers to train quantum models on local machines or simulators. However, the current limitation of available qubits in these environments is a constraint that must be considered for large-scale deployment [10,11]. Multiple challenges were encountered in the development of the proposed model for the SDVN environment, such as: Running complex quantum circuits in simulation can lead to memory overloads or crashes, especially when handling huge datasets [12]. Quantum simulations, especially with hybrid models, can be significantly slower in notebook environments, causing delays in iterative experimentation and model tuning [13]. PennyLane’s default simulators are CPU-based [9] and not optimized for speed. Accessing real quantum devices via plugins from notebooks can introduce additional latency or connection issues. There is a dearth of SDVN-specific DDoS attack datasets, necessitating the adaptation of general DDoS datasets (like [14,15]) for vehicular network scenarios.
To secure the SDN-based VANET environment, it is crucial to first understand the underlying technology and develop a lightweight security solution that minimizes the execution time of cryptographic operations. This work focuses on leveraging QML for the detection of DDoS attacks in SDVN, aiming to enhance threat detection efficiency while ensuring computational feasibility. Designing efficient quantum-assisted defense mechanisms and acquiring the necessary expertise in quantum-enhanced cybersecurity are essential to addressing the security challenges of vehicular networks. The key contributions of this research are as follows: We developed a hybrid C-QNN architecture that combines quantum circuits from PennyLane with classical input and output layers for effective DDoS attack detection in SDVNs. We tested three different quantum machine learning approaches, C-QNN, C-QBM, and C-QKM, to determine DDoS attacks in vehicular networks. Using a hybrid C-QNN model, a 99% accuracy on the UNB-CIC-DDoS dataset and about 90% on the Kaggle DDoS dataset was achieved, outperforming other existing quantum techniques.
Integrating quantum models like QNNs with classical Layers can enhance their efficiency while minimizing computational load [16].
2. Literature Survey
Numerous researchers have published studies in the field of VANETs and SDN. However, only a few have focused on integrating these technologies, and even less research has been conducted for QML-based DDoS attack detection (Figure 1). The authors Rivas et.al. [17] proposed a novel quantum autoencoder that combines quantum computing methods with classical deep learning techniques to enhance cybersecurity. They proposed the usage of randomized quantum circuits for the analysis of time series data from DDoS attacks, which acts as an alternative to conventional convolutional neural networks. The proposed quantum autoencoder was able to learn DDoS hive plots, leading to improved anomaly detection. But the study also points out the limitations of the model concerning scalability, general dataset, and complex computations due to 16-qubit entanglement. The proposed model was trained faster, i.e., it required 15 fewer epochs than its conventional counterpart. This research was able to prove that quantum-based models can improve network security but require further study in scalability and applicability for different datasets.
The authors Kadi et.al. [18] have conducted a comparative study on quantum-classical encoding methods for Network Intrusion Detection Systems (NIDS), addressing the challenges of high-dimensional data processing in cybersecurity. Traditional Intrusion Detection Systems (IDSs) struggle with complex and ever-changing cyber threats, particularly DDoS attacks and IoT-based intrusions. To address this problem, the study evaluates four quantum-classical encoding methods—Amplitude Embedding, Angle Embedding, Instantaneous Quantum Polynomial (IQP) Encoding, and Quantum Approximate Optimization Algorithm (QAOA) Embedding—by implementing a hybrid quantum-classical model for malicious traffic detection. The results reveal that QAOA and Amplitude Embedding achieved the highest accuracy (~89%), whereas IQP Encoding showed lower performance due to encoding inefficiencies.
Said [19] in his paper focuses on vulnerabilities of Smart Micro-Grids (SMGs) to cyber-attacks, especially DDoS attacks, due to their dependency on conventional technologies. The author identified that the current machine learning-based security methods lack the computational speed and power that quantum computing promises. The author proposes a Quantum Support Vector Machine (QSVM) technique for DDoS attack identification in SMGs. This is implemented using the HHL (Harrow-Hassidim-Lloyd) algorithm. Accuracy, precision, and recall between 99.91% and 99.94%. Ninety-three percent reduction in execution time compared to classical SVM. QSVM outperformed classical SVM in both detection performance and computational efficiency. Quantum systems are prone to errors like bit and phase flipping; quantum error correction and fault tolerance (QECFT) mechanisms are essential but challenging.
In the study by Saritha et al. [20], it is highlighted that SDNs decouple the control and data planes, which renders the centralized controller particularly open to DDoS attacks. The study introduces a Quantum-Inspired Ensemble Model (QIEM) that combines a traditional group of machine learning methods with concepts drawn from quantum mechanics. The proposed framework was able to achieve an accuracy of 98% for various DDoS attack types, performing better than standalone classical models. Its layered structure promotes improved scalability and reduces both false positives and false negatives.
The study by Said et al. [21] tackles the issue of determining DDoS attacks within smart grid systems that can severely impact their real-time functionality. The authors introduce a combined approach that integrates Quantum Entropy with Reinforcement Learning to pinpoint DDoS incidents. The proposed method involves quantum entropy analysis, which evaluates irregularities in network traffic patterns, using entropy shifts as early warning signs of attacks. Their model achieved a detection accuracy of 94.4%, surpassing alternatives like Random Forest, SVM, and standard Neural Networks. However, the computational demands of merging quantum entropy with deep reinforcement learning could hinder its use in resource-limited smart grid devices. Additionally, while quantum entropy analysis is theoretically valuable, it currently depends on classical simulation due to constraints in practical quantum computing technology.
Table 1 provides a summary of the key differences and contributions of our paper compared to the existing literature:
3. Model Formulation, Architecture, and Deployment
The preprocessing phase of any machine learning pipeline plays an important role in ensuring that the data are clean, consistent, and ready for use in model training. In this case, the dataset X ∈ Rn×d represents n samples with d numerical features extracted from traffic flows. Each corresponding label in Y ∈ {0,1}n denotes whether a given sample is benign (0) or a DDoS attack (1). Before feeding the data into the hybrid quantum-classical model, standardizing the features is crucial, such that each feature has an equal contribution in the analysis. Standardization transforms each feature xj such that it has a mean of 0 and a standard deviation of 1. This is achieved using the transformation in Equation (1):
(1)
where μj is the mean and σj is the standard deviation of feature j.After standardization, the dataset may still contain redundant or less informative features. To address this and lower the input dimensionality, Principal Component Analysis (PCA) [22,23] is applied. PCA transforms the standardized data X into a fresh feature space X′ ∈ Rn×4 where the top four primary components are retained, because the four components captured the highest variance in the data while minimizing information loss, and the quantum circuit architecture used in our model supports four qubits, which aligns well with the reduced dimensionality. This balance ensures effective learning with computational efficiency under current quantum hardware constraints. This approach ensures that the data fed into the hybrid model is both normalized and reduced in complexity, which can increase the effectiveness of learning and classification accuracy [24,25].
PCA [22,23] is a broadly used technique for dimensionality reduction, which aims to project high-dimensional data into a lower-dimensional subspace while retaining the highest amount of variance in the dataset. In the instance of quantum machine learning, reducing the quantity of input features is especially important because of the current hardware limitations of quantum computers, such as limited qubit counts and gate fidelity. The input dataset X ∈ Rn×d is transformed into a lower-dimensional representation X′ ∈ Rn×4 via matrix multiplication with the PCA weight matrix W ∈ Rd×4 as shown in Equation (2) [24,26]:
(2)
where W ∈ Rd×4 is the matrix of the top four eigenvectors of the covariance matrix .The reduced classical input vector x ∈ R4, obtained after PCA, is passed into a variational quantum circuit (VQC) [27], also called a QNode in the PennyLane framework. The first stage involves encoding this classical data into the quantum state space using Angle Embedding. Each component of xi of the input is utilized as a rotation angle for the quantum gate RY(xi), which rotates the i-th qubit around the Y-axis of the Bloch sphere. This encoding process effectively prepares a quantum state that reflects the form of the input in the quantum domain. The full embedding operation can be denoted as represented in Equation (3), where each qubit receives a data-dependent rotation [9,28,29,30].
(3)
Following the embedding step, a series of parameterized quantum gates are applied via a template known as Strongly Entangling Layers. This template includes a fixed number of layers L = 3, and each layer consists of three single-qubit rotations RZ and RZ, where: l ∈ {1, 2, …, L} denotes the layer index, i ∈ {0, 1, 2, 3} denotes the qubit index, and θl,i,k are the trainable parameters associated with the quantum rotation gates in each layer, are applied sequentially to each qubit i, followed by entangling gates between adjacent qubits. This combination of rotations and entanglement allows the circuit to capture complex feature interactions and correlations that are difficult for classical models to express. The trainable parameters are updated during training through gradient-based optimization as represented in Equation (4) [9,28,29,30]:
(4)
where ” represents the entangling layer applied after each set of single-qubit rotations in a layer, L = 3: number of layers and θ: trainable weights ∈ R3×4×3.Once the quantum state has evolved through the entangling layers, measurement is performed in the Pauli-Z basis for each qubit. The yield of the quantum circuit is a vector z ∈ R4, where each component corresponds to the expectation value of the Pauli-Z operator on qubit i. These expectation merits are real numbers in the range [−1, 1] and represent the quantum-transformed features, which are then forwarded to subsequent classical layers for final classification. Although PCA reduces the original input features to four principal components, the quantum circuit does not act as a simple pass-through. Instead, it performs additional non-linear transformation of these components through a combination of rotation gates and entanglement operations. This process yields a new, enriched set of features (quantum expectation values) that better capture intricate patterns in the data. These are then passed to the classical layers for classification. Thus, the quantum-classical pipeline acts as a learnable and expressive feature transformation stage, beyond the initial PCA-based reduction. [9,28,29,30].
The quantum output vector z, from the quantum circuit, comprising expectation values measured from the Z basis of each qubit, is passed into classical neural network layers to complete the hybrid quantum-classical learning model. The first classical layer is a fully connected (Dense) layer with learnable weights W1 and bias vector b1. The activation function used in this hidden layer is the ReLU [31], due to its simplicity, computational efficiency, and effectiveness in avoiding vanishing gradient problems during training. ReLU is widely adopted in hybrid quantum-classical models, especially when paired with variational quantum circuits, as it tends to provide stable gradients and faster convergence. The ReLU operation is presented in Equation (5)
(5)
where h ∈ Rm serves as the intermediate representation for the next layer.The second classical layer is the output layer, a fully connected single-node layer used for binary classification. Here, h ∈ Rm×1 is the output of the previous hidden layer, and W2 ∈ R1×m is a weight vector, not a full matrix. The bias term b2 ∈ R is a scalar. The multiplication W2h yields a scalar, and the final prediction is computed by applying a sigmoid function [32]. This final prediction given in Equation (6) is compared to the true label y, using a standard binary classification loss.
(6)
The Binary Cross-Entropy loss function [33] is used to lead the training procedure. This loss penalizes wrong projections more severely as they diverge from the true labels, making it greatly suitable for tasks involving binary classification. Given n training samples, the losses are calculated as shown in Equation (7):
(7)
This loss is minimized during training through backpropagation, which also updates the quantum circuit’s parameters via differentiable quantum programming supported by frameworks like PennyLane and TensorFlow [34]. The proposed hybrid classical-quantum model, as shown in Figure 2, integrates both quantum and classical computational layers to perform binary classification in the context of SDVN, particularly targeting applications like DDoS attack detection.
The hybrid quantum-classical model is created using PennyLane and TensorFlow, as presented in Figure 3 and Algorithm 1. The relative analysis of the two DDoS datasets, the Kaggle DDoS SDN Dataset [15] and the CIC-DDoS2019 Dataset [14] from the Canadian Institute for Cybersecurity (CIC), is shown in Table 2. The Kaggle DDoS SDN dataset is tailored for SDN environments, making it suitable for researchers focusing on SDN-specific DDoS detection mechanisms. Its simplicity and smaller size make it ideal for initial experiments and model prototyping. The CIC-DDoS2019 Dataset, with a comprehensive set of attack types and a large volume of data, is well suited for developing and evaluating robust intrusion detection systems. The detailed documentation and realistic traffic scenarios enhance its applicability in real-world settings.
| Algorithm 1: Hybrid C-QNN for Classification |
| Input: A Dataset with features and labels |
The proposed QML models are trained for a maximum of 30 epochs. The dataset is split into 70% for training and 30% for testing. After training, the framework is evaluated on unseen test data to assess its generalization capability. Once trained, the hybrid model is deployed within the SDVN as a real-time detection engine integrated into the Ryu controller as shown in Figure 4.
During deployment, the controller receives flow statistics from the OpenFlow switches. These statistics are preprocessed and passed through the trained quantum-classical model, which predicts whether the flow is a DDoS attack or not. Based on the model’s output, the Ryu controller [35] enforces appropriate actions such as dropping malicious packets, rerouting legitimate traffic, or updating flow rules dynamically. This intelligent decision-making mechanism significantly enhances the responsiveness and resilience of the SDVN against evolving DDoS threats, all while leveraging the potential computational advantage of QML in feature representation and classification.
Figure 4Implementing the proposed hybrid Classical-Quantum model in SDVN [36].
[Figure omitted. See PDF]
4. Simulation Environment Configuration
4.1. Simulation Objective
The main aim of this simulation is to check the effectiveness of different QML models in identifying malicious traffic (DDoS) from normal traffic. It aims to check the feasibility of implementing the QML model in the application layer of the SDVN controller.
4.2. Simulation Tools Used
Mininet-WiFi version 2.3.0 [37] was employed to imitate vehicle movement and wireless interactions among nodes. The Ryu controller version 4.34 [38] is part of the SDN control plane. Python version 3.5.2 is used as the main language for simulation scripts. The hybrid model was built using PennyLane version 0.23.0. The quantum circuits were implemented using PennyLane, and the classical layers, including ReLU and sigmoid activations, were implemented using TensorFlow version 2.3.1 and Keras version 2.10.0 [39]. The simulation relied on two datasets, the Kaggle DDoS SDN Dataset and the CIC-DDoS2019 Dataset, to train and test the model under diverse network attack scenarios.
4.3. Performance Metrics
The machine learning models’ outcome is determined based on the following metrics: Accuracy: It is the ratio of correctly predicted observations to the total observations, as presented in Equation (8) [40]. It is the most intuitive performance measure. Accuracy = (TN + TP)/(Total no. of samples)(8)
Precision: Also called the Positive Predictive Value, is the ratio of correctly predicted positive observations to the total predicted positives as presented in Equation (9) [40].
Precision = TP/(TP + FP)(9)
where TP = True Positives, FP = False Positives.Recall (Sensitivity): It is the ratio of correctly predicted positive observations to all actual positives, as presented in Equation (10) [40].
Recall = TP/(TP + FN)(10)
where TP = True Positives, FN = False Negatives.F1 Score: It is the harmonic mean of precision and recall values. It combines both metrics and is especially useful in imbalanced datasets, as shown in Equation (11) [40].
F1 Score = 2 ∗ (Precision ∗ Recall)/(Precision + Recall)(11)
Adjusted Rand Index (ARI): It checks the similarity between two clustering by considering all pairs of samples and counting pairs that are assigned in the same or different clusters in the predicted and true labels [41], as represented in Equation (12). It adjusts for the chance grouping of elements.
ARI = (RI − E[RI])/(max(RI) − E[RI])(12)
where RI is the Rand Index and E[RI] is the expected RI for random labeling.Normalized Mutual Information (NMI): It measures the amount of information shared between the predicted cluster assignments and the ground truth labels [42], as shown in Equation (13). It normalizes the Mutual Information score to scale between 0 (no mutual info) and 1 (perfect correlation). Let “U” and “V” be the sets of clusters and true labels, then
NMI(U,V) = 2 ∗ I(U,V)/(H(U) + H(V))(13)
where: I(U, V) is the mutual information between U and V, andH(U), H(V) are the entropies of clustering U and V.
Silhouette Score (SS): In contrast to other clusters (separation), it evaluates how similar an object is to its cluster (cohesion) [43] as presented in Equation (14). The score ranges from −1 (incorrect clustering) to 1 (well clustered), with values near 0 indicating overlapping clusters.
For each sample i:
a(i) is the average intra-cluster distance (mean distance to other points in the same cluster), and b(i) is the average nearest-cluster distance (mean distance to points in the nearest cluster)
SS(i) = (b(i) − a(i))/max(a(i), b(i))(14)
4.4. Experimental Setup
The experimental setup for the proposed architecture was planned to evaluate its effectiveness in determining DDoS attacks within an SDVN environment. In this research, a comprehensive evaluation of three QML approaches was conducted: Quantum Neural Networks (QNNs), Quantum Boltzmann Machines (QBMs), and Quantum-Assisted K-Means (QKM) Clustering. Among these, a hybrid Classical-Quantum Neural Network (C-QNN) model was proposed for effectively detecting DDoS attacks in SDVN environments. The C-QNN architecture was implemented by integrating quantum circuits developed using PennyLane with classical deep learning layers constructed in TensorFlow, creating a seamless hybrid model. For anomaly detection, the C-QBM model utilized quantum-generated probability distributions, while the C-QKM method was employed as an unsupervised learning strategy to identify malicious traffic clusters. The experimental setup involved simulating vehicular network topologies using Mininet-WiFi and controlling the data flow through a Ryu SDVN controller. DDoS attack scenarios were emulated within this environment. The datasets were pre-processed and used to train and test the three models. Simulation and training were conducted using the PennyLane quantum simulator for quantum components and classical backends for neural layers. The overall experimental setup effectively replicates an SDVN environment and allows for rigorous testing of the proposed quantum-enhanced intrusion detection model.
4.5. Testbed Deployment
The proposed Hybrid Quantum-Classical Models were tested in an SDVN environment using a flooding-based DDoS attack simulation as shown in Algorithm 2 and the hyper settings used for all hybrid Classical-Quantum models has been represented in Table 3.
| Algorithm 2: Testing Quantum Models in SDVN Environment via Flooding |
| Input: Trained quantum and hybrid quantum-classical models (C-QNN, QBM, QKM), SDVN testbed (Mininet-WiFi with Ryu controller) |
This testing algorithm ensures a realistic SDVN scenario where flooding-based DDoS attacks are executed in a controlled environment, and the effectiveness of quantum-based detection models is evaluated. The custom network is developed using the mininet-wifi graph as presented in Figure 5, and network simulation parameters are provided in Table 4.
5. Result Analysis
The comparative analysis of the three Quantum Machine Learning (QML) methods from the results in Table 5 and Figure 6 shows that both C-QNN and C-QKM deliver exceptionally high classification performance, while C-QBM lags significantly behind in key areas. C-QNN achieves the highest accuracy of 99.89%, just slightly outperforming C-QKM by 0.01%, and vastly outperforming C-QBM, which stands at 50.62%, indicating that C-QNN is nearly twice as accurate. Regarding recall, which measures the model’s capacity to detect true positives, C-QNN leads with 99.94%, slightly above C-QKM’s, and substantially better than C-QBM’s, a difference of approximately 49%. The F1 score, which balances precision and recall, is 0.99 for both C-QNN and C-QKM, showing their robustness in classification tasks, while C-QBM’s F1 score is only 0.6712, making C-QNN roughly 47.4% better in harmonic performance. Although C-QBM shows high precision (99.33%), it does so at the cost of extremely low recall, meaning it predicts very few actual positives correctly. C-QKM also shows strength in clustering metrics, with an Adjusted Rand Index (ARI) of 0.9075, Normalized Mutual Information (NMI) of 0.8431, and a Silhouette Score of 0.9772, all indicating excellent cluster quality and cohesion. However, since C-QNN is a supervised model and does not report clustering metrics, its superiority is evident in all classification-related aspects.
The performance comparison between the three QML methods presented in Table 6 and Figure 7 reveals that the C-QNN significantly outperforms the others across all key classification metrics. In terms of accuracy, C-QNN achieves 89.96%, which is significantly higher than C-QBM and C-QKM, indicating its superior ability to correctly classify samples. For precision, C-QNN scores 78.55%, which is 2.1% higher than C-QBM and 27.1% higher than C-QKM, showing it makes fewer false positive predictions. The recall of C-QNN is 83.64%, a dramatic improvement over C-QBM’s near-zero 0.39%, and 15.4% higher than C-QKM, suggesting it captures far more actual positives. Similarly, the F1 score of C-QNN stands at 81.09%, vastly outperforming C-QBM and C-QKM by about 35.3%, reflecting a better balance between precision and recall. Additionally, while clustering metrics like ARI, NMI, and Silhouette Score are reported only for C-QKM due to its unsupervised nature, their relatively low values further affirm that C-QNN is a highly robust and reliable method amongst the three for accurate and meaningful classification in this application context.
6. Results Discussion
The C-QNN outperformed the other QML models across all key evaluation metrics. This superior performance can be credited to the hybrid nature of C-QNN, which combines classical techniques with quantum circuits. Specifically, it employs parameterized quantum circuits using strongly entangling layers and angle embedding schemes. These quantum components allow the model to represent complex, non-linear relationships in data through high-dimensional quantum state spaces, enabling more accurate and nuanced classification than the other methods. The C-QNN model is trained with labeled data, enabling direct optimization of its parameters to improve performance. It employs gradient-based backpropagation with the Adam optimizer (optimization process), which effectively fine-tunes both classical and quantum parameters. In contrast, the C-QBM model operates on energy-based learning principles and usually faces challenges in arriving at an optimal solution, especially with small quantum circuits and limited qubits. The experimental comparison of these QML approaches is significantly relevant for developing intelligent, adaptive systems. The proposed framework has better recall and F1 scores, highlighting its ability to detect both majority and minority classes, indicating its effectiveness in managing imbalanced data, which is common in real-world network environments.
7. Conclusions and Future Work
In this study, we provided a comparison study on three Quantum Machine Learning models, Classical-Quantum Neural Network (C-QNN), Quantum Boltzmann Machine (C-QBM), and Quantum k-Means (C-QKM), on two real-world datasets to evaluate their performance in classification and clustering tasks. The results obtained show that the C-QNN model outperforms the other two techniques across all key classification metrics, like accuracy, precision, recall, and F1 score. The experiment results showed encouraging outcomes, but it also showcased significant drawbacks and practical difficulties in the current state of QML development. The basic constraint is limited access to actual quantum hardware, as quantum computers with adequate qubits are not publicly available. The execution time for even a single model is significantly large, and hence it becomes very challenging to scale the experiment or to explore other techniques with a local simulation setup. Also, these simulations are time-consuming because of computational complexities and limited qubits. This hardware limitation restricts us from using data in its original form and requires PCA for dimensionality reduction. This reduction may have restricted the model’s capability to fully represent the underlying relations, potentially affecting performance. Additionally, few QML algorithms are available in comparison to traditional machine learning algorithms, narrowing the scope for exploring quantum solutions.
Future researchers may use cloud-based quantum computers as they become more easily available, allowing experiments with more qubits and real-time processing. We used ReLU as the activation function in the classical hidden layer due to its efficiency and empirical effectiveness in hybrid learning settings. A comparative analysis with other activation functions can be planned as future work. Expanding the range of QML algorithms, refining encoding techniques, and enhancing hybrid quantum-classical frameworks will be critical for improving the practicality, efficiency, and accuracy of QML models.
Conceptualization, C.V.R.; Methodology, S.A.K.; Software, V.P.S.; Validation, V.P.S. and S.A.K.; Investigation, V.P.S.; Writing—original draft, V.P.S.; Writing—review & editing, S.A.K. and C.V.R.; Supervision, C.V.R. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
The datasets utilized in this study are openly accessible in the UNB-CIC repository (
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1 Paper’s focus.
Figure 2 Architecture of the proposed hybrid Classical-Quantum model.
Figure 3 Steps involved in the training and testing of the proposed hybrid Classical-Quantum model.
Figure 5 Custom network model using mininet-Wifi Graph [
Figure 6 QML metrics comparison for UNB-CIC-DDoS dataset.
Figure 7 QML metrics comparison for Kaggle DDoS dataset.
Key differences and contributions of our research work.
| Aspect | Our Contribution | Difference from Existing Literature |
|---|---|---|
| Target Domain | Focused on Software-Defined Vehicular Networks (SDVNs) | Other works mainly address Smart Micro-Grids (SMG), generic SDNs, or NIDS. |
| Model Type | Hybrid Classical-Quantum Neural Network (C-QNN), QBM, and QKM | Other studies use single models like QSVM, QAOA, or conceptually inspired methods. |
| Quantum Integration | Implemented real quantum circuits using PennyLane | Many existing works are quantum-inspired only or rely on classical simulations. |
| Learning Paradigms | Combination of supervised (C-QNN), unsupervised (QKM), and probabilistic (QBM) models | Most papers focus on only one paradigm (e.g., QSVM or Ensemble methods). |
| Benchmark Datasets | Tested on two real-world DDoS datasets: UNB-CIC-DDoS and Kaggle DDoS | Some existing works use limited or synthetic datasets; not all benchmark multiple datasets. |
| Performance | Achieves ~99% accuracy on UNB-CIC and ~90% on the Kaggle dataset | Higher or comparable performance, with broader applicability to vehicular networks. |
| Scalability and Realism | Addresses realistic traffic in SDVN, including multi-model performance | Other methods often lack domain-specific tuning or real deployment scenarios. |
Comparison between the Kaggle and CIC DDoS dataset.
| Aspect | Kaggle DDoS SDN Dataset [ | CIC-DDoS2019 Dataset [ |
|---|---|---|
| Source | Kaggle (Contributed by Aiken Kazin) | Canadian Institute for Cybersecurity (CIC) |
| Year of Release | 2020 | 2019 |
| Environment | Simulated SDN environment using Mininet emulator with Ryu controller. | Realistic testbed simulating a victim network with multiple operating systems and a firewall. |
| Features | 23 features including switch ID, packet count, byte count, duration, source/destination IPs, ports, tx_bytes, rx_bytes, and timestamp. | Over 80 features, including flow duration, packet counts, byte counts, and various statistical measures. |
| Data Format | CSV files with labelled flows. | CSV files with labelled flows. |
| Labeling | Binary labels indicating normal or attack traffic. | Detailed labelling with specific attack types and timestamps. |
| Use Case | Designed for evaluating DDoS detection mechanisms in SDN environments. | Suitable for developing and evaluating intrusion detection systems, especially for DDoS attack determination and taxonomy studies. |
Hyper settings for all hybrid Classical-Quantum models.
| Model Type | Dataset | Qubits | Layers | Learning Rate | Epochs | Batch Size | Optimizer | PCA Components |
|---|---|---|---|---|---|---|---|---|
| C-QNN | UNB-CIC-DDoS | 2 | 1 | 0.01 | 30 | 5 | Adam (PennyLane) | 2 |
| C-QNN | Kaggle DDoS | 4 | 3 | default (Adam) | 30 | 5 | Adam (PennyLane) | 2 |
| C-QKM | UNB-CIC-DDoS | 4 | – | – | 30 | – | – (iterative update) | 2 |
| C-QKM | Kaggle DDoS | 2 | – | – | 30 | – | – (iterative update) | 2 |
| C-QBM | UNB-CIC-DDoS | 2 | – | 0.005 | 30 | – | Adam (PennyLane) | 2 |
| C-QBM | Kaggle DDoS | 2 | – | 0.05 | 30 | – | Adam (PennyLane) | 2 |
Network simulation parameters.
| Parameter | Value/Setting |
|---|---|
| Simulator | Mininet-Wifi (Python-based network simulator) |
| Controller | Ryu SDVN Controller |
| Number of Vehicles (Nodes) | 10 |
| Number of APs (RSUs) | 9 |
| Vehicle Interfaces | WLAN interfaces |
| Vehicle speed range | min_speed = 0 kmph, max_speed = 100 kmph (randomised input mobility model) |
| RSU Mode | 802.11 n/ac |
| Propagation Model | Friss (path loss model) |
| Wireless link type | wmediumd (interference mode: Realistic link quality modelling) |
Results obtained for different QML models for UNB-CIC-DDoS dataset.
| QML Method | Accuracy | Precision | Recall | F1 Score | ARI | NMI | Silhouette Score |
|---|---|---|---|---|---|---|---|
| C-QNN | 0.9989 | 0.99 | 0.9994 | 0.99 | - | - | - |
| C-QBM | 0.5062 | 0.9933 | 0.5068 | 0.6712 | - | - | - |
| C-QKM | 0.9988 | 0.99 | 0.9988 | 0.99 | 0.9075 | 0.8431 | 0.9772 |
Results obtained for different QML models for Kaggle DDoS dataset.
| QML Method | Accuracy | Precision | Recall | F1 Score | ARI | NMI | Silhouette Score |
|---|---|---|---|---|---|---|---|
| C-QNN | 0.8996 | 0.7855 | 0.8364 | 0.8109 | - | - | - |
| C-QBM | 0.6108 | 0.7692 | 0.0039 | 0.0065 | - | - | - |
| C-QKM | 0.6219 | 0.5107 | 0.7247 | 0.5992 | 0.0588 | 0.05746 | 0.1791 |
1. Hussein, N.H.; Koh, J.S.P.; Yaw, C.T.; Tiong, S.K.; Benedict, F.; Yusaf, T.; Kadirgama, K.; Hong, T.C. SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges. IEEE Access; 2024; 13, pp. 126801-126861. [DOI: https://dx.doi.org/10.1109/ACCESS.2024.3355313]
2. Chaudhary, R.; Aujla, G.S.; Kumar, N.; Chouhan, P.K. A comprehensive survey on software-defined networking for smart communities. Int. J. Commun. Syst.; 2025; 38, e5296. [DOI: https://dx.doi.org/10.1002/dac.5296]
3. Alaya, B.; Sellami, L. Toward the Design of an Efficient and Secure System Based on the Software-Defined Network Paradigm for Vehicular Networks. IEEE Access; 2023; 11, pp. 43333-43348. [DOI: https://dx.doi.org/10.1109/ACCESS.2023.3264808]
4. Kumar, R.; Agrawal, N. A survey on software-defined vehicular networks (SDVNs): A security perspective. J. Supercomput.; 2022; 79, pp. 8368-8400. [DOI: https://dx.doi.org/10.1007/s11227-022-05008-y]
5. Babbar, H.; Rani, S.; Driss, M. Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning. PLoS ONE; 2024; 19, e0314695. [DOI: https://dx.doi.org/10.1371/journal.pone.0314695]
6. Musa, N.S.; Mirza, N.M.; Rafique, S.H.; Abdallah, A.M.; Murugan, T. Machine Learning and Deep Learning Techniques for Distributed Denial of Service Anomaly Detection in Software Defined Networks—Current Research Solutions. IEEE Access; 2024; 12, pp. 17982-18011. [DOI: https://dx.doi.org/10.1109/ACCESS.2024.3360868]
7. Zeguendry, A.; Jarir, Z.; Quafafou, M. Quantum machine learning: A review and case studies. Entropy; 2023; 25, 287. [DOI: https://dx.doi.org/10.3390/e25020287]
8. Abbas, A.; Sutter, D.; Zoufal, C.; Lucchi, A.; Figalli, A.; Woerner, S. The power of quantum neural networks. Nat. Comput. Sci.; 2021; 1, pp. 403-409. [DOI: https://dx.doi.org/10.1038/s43588-021-00084-1]
9. Pennylane Documentation. Available online: https://pennylane.ai/qml (accessed on 17 June 2025).
10. Küçükkara, M.Y.; Atban, F.; Bayılmış, C. Quantum-Neural Network Model for Platform Independent Ddos Attack Classification in Cyber Security. Adv. Quantum Technol.; 2024; 7, 2400084. [DOI: https://dx.doi.org/10.1002/qute.202400084]
11. Tychola, K.A.; Kalampokas, T.; Papakostas, G.A. Quantum Machine Learning—An Overview. Electronics; 2023; 12, 2379. [DOI: https://dx.doi.org/10.3390/electronics12112379]
12. Oftelie, L.B.; Urbanek, M.; Metcalf, M.; Carter, J.; Kemper, A.F.; de Jong, W.A. Simulating quantum materials with digital quantum computers. Quantum Sci. Technol.; 2021; 6, 043002. [DOI: https://dx.doi.org/10.1088/2058-9565/ac1ca6]
13. Aldoseri, A.; Al-Khalifa, K.N.; Hamouda, A.M. Re-Thinking Data Strategy and Integration for Artificial Intelligence: Concepts, Opportunities, and Challenges. Appl. Sci.; 2023; 13, 7082. [DOI: https://dx.doi.org/10.3390/app13127082]
14. DoS Evaluation Dataset (CIC-DDoS2019). Available online: https://www.unb.ca/cic/datasets/ddos-2019.html (accessed on 17 June 2025).
15. DDoS SDN Dataset. Available online: https://www.kaggle.com/datasets/aikenkazin/ddos-sdn-dataset (accessed on 17 June 2025).
16. Devadas, R.M.; Sowmya, T. Quantum machine learning: A comprehensive review of integrating AI with quantum computing for computational advancements. MethodsX; 2025; 14, 103318. [DOI: https://dx.doi.org/10.1016/j.mex.2025.103318]
17. Rivas, P.; Orduz, J.; Jui, T.D.; DeCusatis, C.; Khanal, B. Quantum-Enhanced Representation Learning: A Quanvolutional Autoencoder Approach against DDoS Threats. Mach. Learn. Knowl. Extr.; 2024; 6, pp. 944-964. [DOI: https://dx.doi.org/10.3390/make6020044]
18. Kadi, A.; Selamnia, A.; Houda, Z.A.E.; Moudoud, H.; Brik, B.; Khoukhi, L. An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection. IEEE Open J. Commun. Soc.; 2025; 6, pp. 1129-1148. [DOI: https://dx.doi.org/10.1109/OJCOMS.2025.3537957]
19. Said, D. Quantum Computing and Machine Learning for Cybersecurity: Distributed Denial of Service (DDoS) Attack Detection on Smart Micro-Grid. Energies; 2023; 16, 3572. [DOI: https://dx.doi.org/10.3390/en16083572]
20. Saritha, A.; Reddy, B.R.; Babu, A.S. QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture. Wirel. Pers. Commun.; 2022; 127, pp. 2365-2390. [DOI: https://dx.doi.org/10.1007/s11277-021-08805-5]
21. Said, D.; Bagaa, M.; Oukaira, A.; Lakhssassi, A. Quantum Entropy and Reinforcement Learning for Distributed Denial of Service Attack Detection in Smart Grid. IEEE Access; 2024; 12, pp. 129858-129869. [DOI: https://dx.doi.org/10.1109/ACCESS.2024.3441931]
22. Hasan, B.M.S.; Abdulazeez, A.M. A Review of Principal Component Analysis Algorithm for Dimensionality Reduction. J. Soft Comput. Data Min.; 2021; 2, pp. 20-30. [DOI: https://dx.doi.org/10.30880/jscdm.2021.02.01.003]
23. Gewers, F.L.; Ferreira, G.R.; Arruda, H.F.D.; Silva, F.N.; Comin, C.H.; Amancio, D.R.; Costa, L.D.F. Principal component analysis: A natural approach to data exploration. ACM Comput. Surv. (CSUR); 2021; 54, pp. 1-34. [DOI: https://dx.doi.org/10.1145/3447755]
24. Mancilla, J.; Pere, C. A Preprocessing Perspective for Quantum Machine Learning Classification Advantage in Finance Using NISQ Algorithms. Entropy; 2022; 24, 1656. [DOI: https://dx.doi.org/10.3390/e24111656] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/36421511]
25. Hou, Y.-Y.; Li, J.; Xu, T.; Liu, X.-Y. A hybrid quantum-classical classification model based on branching multi-scale entanglement renormalization ansatz. Sci. Rep.; 2024; 14, 18521. [DOI: https://dx.doi.org/10.1038/s41598-024-69384-6] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/39122811]
26. Chen, S.Y.-C.; Huang, C.-M.; Hsing, C.-W.; Kao, Y.-J. An end-to-end trainable hybrid classical-quantum classifier. Mach. Learn. Sci. Technol.; 2021; 2, 045021. [DOI: https://dx.doi.org/10.1088/2632-2153/ac104d]
27. Ajagekar, A.; You, F. Variational quantum circuit based demand response in buildings leveraging a hybrid quantum-classical strategy. Appl. Energy; 2024; 364, 123244. [DOI: https://dx.doi.org/10.1016/j.apenergy.2024.123244]
28. Combarro, E.F.; González-Castillo, S.; Di Meglio, A. A Practical Guide to Quantum Machine Learning and Quantum Optimization: Hands-on Approach to Modern Quantum Algorithms; Packt Publishing Ltd.: Birmingham, UK, 2023.
29. Zhou, X.; Qiu, D. Blind quantum machine learning based on quantum circuit model. Quantum Inf. Process.; 2021; 20, 363. [DOI: https://dx.doi.org/10.1007/s11128-021-03301-y]
30. Liu, Y.; Arunachalam, S.; Temme, K. A rigorous and robust quantum speed-up in supervised machine learning. Nat. Phys.; 2021; 17, pp. 1013-1017. [DOI: https://dx.doi.org/10.1038/s41567-021-01287-z]
31. Daubechies, I.; DeVore, R.; Foucart, S.; Hanin, B. Nonlinear Approximation and (Deep) ReLU Networks. Constr. Approx.; 2021; 55, pp. 127-172. [DOI: https://dx.doi.org/10.1007/s00365-021-09548-z]
32. Dubey, S.R.; Singh, S.K.; Chaudhuri, B.B. Activation functions in deep learning: A comprehensive survey and benchmark. Neurocomputing; 2022; 503, pp. 92-108. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.06.111]
33. Hurtik, P.; Tomasiello, S.; Hula, J.; Hynar, D. Binary cross-entropy with dynamical clipping. Neural Comput. Appl.; 2022; 34, pp. 12029-12041. [DOI: https://dx.doi.org/10.1007/s00521-022-07091-x]
34. TensorFlow Documentation. Available online: https://www.tensorflow.org/ (accessed on 17 June 2025).
35. Bhardwaj, S.; Panda, S.N. Performance Evaluation Using RYU SDN Controller in Software-Defined Networking Environment. Wirel. Pers. Commun.; 2022; 122, pp. 701-723. [DOI: https://dx.doi.org/10.1007/s11277-021-08920-3]
36. Sarvade, V.P.; Kulkarni, S.A. Support vector machine empowered Ryu controller for enhanced multimedia QoS in a realistic software defined vehicular networks. Data Science & Exploration in Artificial Intelligence: CODE-AI; CRC Press: Boca Raton, FL, USA, 2025; [DOI: https://dx.doi.org/10.1201/9781003587392-25]
37. Fontes, R.R.; Afzal, S.; Brito, S.H.B.; Santos, M.A.S.; Rothenberg, C.E. Mininet-WiFi: Emulating software-defined wireless networks. Proceedings of the International Conference on Network and Service Management (CNSM); Barcelona, Spain, 9–13 November 2015; IEEE: New York, NY, USA, 2016; pp. 384-389. [DOI: https://dx.doi.org/10.1109/CNSM.2015.7367387]
38. Ryu Controller. Available online: https://ryu-sdn.org/ (accessed on 17 June 2025).
39. Keras Documentation. Available online: https://keras.io/ (accessed on 17 June 2025).
40. Classification: Accuracy, Recall, Precision, and Related Metrics, Google for Developers. Available online: https://developers.google.com/machine-learning/crash-course/classification/accuracy-precision-recall (accessed on 17 June 2025).
41. Sundqvist, M.; Chiquet, J.; Rigaill, G. Adjusting the adjusted Rand Index. Comput. Stat.; 2022; 38, pp. 327-347. [DOI: https://dx.doi.org/10.1007/s00180-022-01230-7]
42. Islam, M.R.; Ahmed, B.; Hossain, M.A.; Uddin, M.P. Mutual Information-Driven Feature Reduction for Hyperspectral Image Classification. Sensors; 2023; 23, 657. [DOI: https://dx.doi.org/10.3390/s23020657]
43. Shutaywi, M.; Kachouie, N.N. Silhouette Analysis for Performance Evaluation in Machine Learning with Applications to Clustering. Entropy; 2021; 23, 759. [DOI: https://dx.doi.org/10.3390/e23060759]
44. Sarvade, V.P.; Kulkarni, S.A. Deep learning based adaptive Ryu controller model for quality of experience issues in multimedia streaming for software defined vehicular networks. Appl. Int.; 2024; 54, pp. 9543-9564. [DOI: https://dx.doi.org/10.1007/s10489-024-05642-4]
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.