G. A., Senthil and Prabha, R. and Priyanga, P. and Sridevi, S. (2024) Quantum Cryptography-Enhanced Cyber Security Intrusion Detection System APTs Attacks in Blockchain:. In: Advancing Cyber Security Through Quantum Cryptography. IGI Global, pp. 87-102.
![[thumbnail of Quantum-Cryptography-Enhanced-Cyber-Security-Intrusion-Detection-System-APTs-Attacks-in-Blockchain.pdf]](https://ir.vistas.ac.in/style/images/fileicons/text.png)
Quantum-Cryptography-Enhanced-Cyber-Security-Intrusion-Detection-System-APTs-Attacks-in-Blockchain.pdf
Download (313kB)
Abstract
Senthil G. A. Agni College of Technology, India https://orcid.org/0000-0001-7442-5499 R. Prabha Sri Sairam Institute of Technology, India P. Priyanga RNS Institute of Technology, India S. Sridevi Vels Institute of Science, Technology, and Advanced Studies, India https://orcid.org/0000-0003-2227-4371 Quantum Cryptography-Enhanced Cyber Security Intrusion Detection System APTs Attacks in Blockchain
The novel proposed in this paper aims to revolutionize cybersecurity within Blockchain systems by integrating Quantum Cryptography with federated deep reinforcement learning intrusion detection systems (IDPS). This pioneering fusion of cutting-edge technologies offers a multifaceted defense mechanism against advanced persistent threats (APTs) while preserving the decentralized nature of Blockchain networks. Complementing Quantum Cryptography, federated deep reinforcement learning enhances cybersecurity by deploying AI-driven intrusion detection systems across decentralized Blockchain nodes. This decentralized learning paradigm empowers Blockchain networks to adapt dynamically to evolving cyber threats, ensuring timely and effective responses to malicious activities. Quantum Cryptography and federated deep reinforcement learning, the proposed framework defines strategy against sophisticated cyber-attacks, bolstering the resilience of Blockchain systems. Markov Decision Process is the reinforcement learning algorithm used in the proposed system that detects cyber-attacks and threats.
chapter 4 2024 10 23 87 102 10.4018/979-8-3693-5961-7.ch004 20250411035313 https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-5961-7.ch004 https://www.igi-global.com/viewtitle.aspx?TitleId=360363 10.1109/TVT.2022.3186834 10.1109/ACCESS.2022.3188798 10.1109/TEM.2022.3175633 10.1109/ACCESS.2020.2968985 10.1109/ICN60549.2023.10426084 10.25103/jestr.103.17 10.1007/s40747-016-0033-5 10.1109/ICCIT60459.2023.10441286 10.1109/NSS/MIC44867.2021.9875813 10.1109/ICCMC56507.2023.10083673 10.1109/VTC2022-Fall57202.2022.10012702
Item Type: | Book Section |
---|---|
Subjects: | Computer Science Engineering > Data Engineering |
Domains: | Computer Science Engineering |
Depositing User: | Mr IR Admin |
Date Deposited: | 29 Aug 2025 04:42 |
Last Modified: | 29 Aug 2025 04:42 |
URI: | https://ir.vistas.ac.in/id/eprint/10887 |