Main Article Content
Abstract
The cat-and-mouse game is endless. On the one hand, the security industry is ceaselessly countering security technologies to immunize against perceptible threats. On the other hand, adversaries are always attempting to devise cutting-edge exfiltration schemes for potential return on investment. Ever since the Federal Bureau of Investigation (FBI) released the Flash report that hinges on raw indicators to unveil LICAT backdoor on Joomla websites running PHP, adversaries tweaked their infection vectors to avoid detectable host-based artifacts. Economic and geopolitical aspects also spurred the entrenchment of Advanced Persistent Threats (APTs). Major players in cyber industry are investing manifold resources into protracted espionage campaigns by concentrating on high-value targets. While research in QC is progressing, there are also challenges in harnessing the technology’s full capabilities. Much like conventional computing requiring some understanding about a computer’s architecture, a fundamental understanding of quantum mechanics is needed to comprehend QC . To explore how advances in quantum may be applied in cybersecurity tasks, developments in this technology are reviewed. Quantum computing can help to deal with cybersecurity tasks by enhancing problem complexity due to its advantages in performing complex tasks effectively. Cybersecurity tasks may be substantially complex, requiring understanding non-local correlations and collecting a large quantity of data points in different fidelities and complexities.
Keywords
Article Details
Copyright (c) 2025 Mohammed abdulhamza Noor (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, and S. Lloyd, “Quantum machine learning,” Nature, vol. 549, no. 7671, pp. 195–202, Sept. 2017, doi: https://doi.org/10.1038/nature23474.
- M. Schuld and F. Petruccione, Supervised Learning with Quantum Computers. Cham, Switzerland: Springer, 2018, doi: https://doi.org/10.1007/978-3-319-96424-9.
- P. Rebentrost, M. Mohseni, and S. Lloyd, “Quantum support vector machine for big data classification,” Phys. Rev. Lett., vol. 113, no. 13, Art. no. 130503, 2014, doi: https://doi.org/10.1103/PhysRevLett.113.130503.
- V. Havlíček, A. D. Córcoles, K. Temme, A. W. Harrow, A. Kandala, J. M. Chow, and J. M. Gambetta, “Supervised learning with quantum-enhanced feature spaces,” Nature, vol. 567, no. 7747, pp. 209–212, Mar. 2019, doi: https://doi.org/10.1038/s41586-019-0980-2.
- M. Schuld, A. Bocharov, K. Svore, and N. Wiebe, “Circuit-centric quantum classifiers,” Phys. Rev. A, vol. 101, no. 3, Art. no. 032308, 2020, doi: https://doi.org/10.1103/PhysRevA.101.032308.
- J. Preskill, “Quantum computing in the NISQ era and beyond,” Phys. Rev. X, vol. 8, no. 3, Art. no.031007, Aug. 2018,doi: https://doi.org/10.1103/PhysRevX.8.031007.
- M. Cerezo et al., “Variational quantum algorithms,” Nat. Rev. Phys., vol. 3, no. 9, pp. 625–644, Sept. 2021, doi: https://doi.org/10.1038/s42254-021-00348-9.
- F. Arute et al., “Quantum supremacy using a programmable superconducting processor,” Nature, vol. 574, pp. 505–510, Oct. 2019, doi: https://doi.org/10.1038/s41586-019-1666-5.
- Y. Xin et al., “Machine learning and deep learning methods for cybersecurity,” IEEE Access, vol. 6, pp. 35365–35381, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2836950.
- W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, “Malware traffic classification using convolutional neural network,” in Proc. IEEE Int. Conf. Commun. (ICC), 2017, doi:https://doi.org/.10.1109/ICC.2017.7996808.
- N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection,” in Proc. MilCIS, 2015.
- S. Lloyd, M. Mohseni, and P. Rebentrost, “Quantum algorithms for supervised and unsupervised machine learning,” arXiv:1307.0411, 2013.
- H. Chen, M. Zeng, and Y. Wang, “Quantum machine learning: A review and applications,” Quantum Inf. Process., vol. 20, Art. no. 50, 2021, doi: https://doi.org/10.1007/s11128-021-02945-9.
- M. Schuld and N. Killoran, “Quantum machine learning in feature Hilbert spaces,” Phys. Rev. Lett., vol. 122, no. 4, Art. no. 040504, 2019, doi: https://doi.org/10.1103/PhysRevLett.122.040504.
- K. Bharti et al., “Noisy intermediate-scale quantum (NISQ) algorithms,” Rev. Mod. Phys., vol. 94, no. 1, Art. no. 015004, 2022, doi: https://doi.org/10.1103/RevModPhys.94.015004.
- M. Schuld, I. Sinayskiy, and F. Petruccione, “The quest for a quantum neural network,” Quantum Inf. Process., vol. 13, no. 11, pp. 2567–2586, Nov. 2014, doi: https://doi.org/10.1007/s11128-014-0809-8.
References
J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, and S. Lloyd, “Quantum machine learning,” Nature, vol. 549, no. 7671, pp. 195–202, Sept. 2017, doi: https://doi.org/10.1038/nature23474.
M. Schuld and F. Petruccione, Supervised Learning with Quantum Computers. Cham, Switzerland: Springer, 2018, doi: https://doi.org/10.1007/978-3-319-96424-9.
P. Rebentrost, M. Mohseni, and S. Lloyd, “Quantum support vector machine for big data classification,” Phys. Rev. Lett., vol. 113, no. 13, Art. no. 130503, 2014, doi: https://doi.org/10.1103/PhysRevLett.113.130503.
V. Havlíček, A. D. Córcoles, K. Temme, A. W. Harrow, A. Kandala, J. M. Chow, and J. M. Gambetta, “Supervised learning with quantum-enhanced feature spaces,” Nature, vol. 567, no. 7747, pp. 209–212, Mar. 2019, doi: https://doi.org/10.1038/s41586-019-0980-2.
M. Schuld, A. Bocharov, K. Svore, and N. Wiebe, “Circuit-centric quantum classifiers,” Phys. Rev. A, vol. 101, no. 3, Art. no. 032308, 2020, doi: https://doi.org/10.1103/PhysRevA.101.032308.
J. Preskill, “Quantum computing in the NISQ era and beyond,” Phys. Rev. X, vol. 8, no. 3, Art. no.031007, Aug. 2018,doi: https://doi.org/10.1103/PhysRevX.8.031007.
M. Cerezo et al., “Variational quantum algorithms,” Nat. Rev. Phys., vol. 3, no. 9, pp. 625–644, Sept. 2021, doi: https://doi.org/10.1038/s42254-021-00348-9.
F. Arute et al., “Quantum supremacy using a programmable superconducting processor,” Nature, vol. 574, pp. 505–510, Oct. 2019, doi: https://doi.org/10.1038/s41586-019-1666-5.
Y. Xin et al., “Machine learning and deep learning methods for cybersecurity,” IEEE Access, vol. 6, pp. 35365–35381, 2018, doi: https://doi.org/10.1109/ACCESS.2018.2836950.
W. Wang, M. Zhu, X. Zeng, X. Ye, and Y. Sheng, “Malware traffic classification using convolutional neural network,” in Proc. IEEE Int. Conf. Commun. (ICC), 2017, doi:https://doi.org/.10.1109/ICC.2017.7996808.
N. Moustafa and J. Slay, “UNSW-NB15: A comprehensive data set for network intrusion detection,” in Proc. MilCIS, 2015.
S. Lloyd, M. Mohseni, and P. Rebentrost, “Quantum algorithms for supervised and unsupervised machine learning,” arXiv:1307.0411, 2013.
H. Chen, M. Zeng, and Y. Wang, “Quantum machine learning: A review and applications,” Quantum Inf. Process., vol. 20, Art. no. 50, 2021, doi: https://doi.org/10.1007/s11128-021-02945-9.
M. Schuld and N. Killoran, “Quantum machine learning in feature Hilbert spaces,” Phys. Rev. Lett., vol. 122, no. 4, Art. no. 040504, 2019, doi: https://doi.org/10.1103/PhysRevLett.122.040504.
K. Bharti et al., “Noisy intermediate-scale quantum (NISQ) algorithms,” Rev. Mod. Phys., vol. 94, no. 1, Art. no. 015004, 2022, doi: https://doi.org/10.1103/RevModPhys.94.015004.
M. Schuld, I. Sinayskiy, and F. Petruccione, “The quest for a quantum neural network,” Quantum Inf. Process., vol. 13, no. 11, pp. 2567–2586, Nov. 2014, doi: https://doi.org/10.1007/s11128-014-0809-8.
