Q Canary : An AI and Quantum based Ransomware detection Solution
MohitChandraSaxenaM2
22 views
18 slides
Aug 27, 2025
Slide 1 of 18
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
About This Presentation
An AI and Quantum based Early Ransomware detection Solution
Size: 237.96 KB
Language: en
Added: Aug 27, 2025
Slides: 18 pages
Slide Content
Q-Canary: Hybrid Quantum-AI for
Early Ransomware Detection
AI + Quantum = Detect & stop
ransomware in the pre-encryption
window
The Patriots
Dr. Mohit Chandra Saxena & Mr. Abhishek Tamrakar
The
Problem:
Early,
Reliable
Detection
Is Hard
Ransomware does
damage within
seconds once
encryption starts
Traditional
EDR gaps
Signa
tures
are
evad
ed
by
new
varia
nts
Beha
vior
rules
trigg
er
late
or
creat
e
noise
unde
r
heav
y I/O Need sub-5s
detection on subtle
pre-encryption
micro-behaviors
Our Approach: What’s New
Hybrid signal fusion
Lightweight AI model on micro-behaviors (2–5s
windows)
Quantum kernel novelty score to detect
distribution shift
QUBO-optimized canary placement as a
high-confidence tripwire
Act before encryption—throttle/suspend,
snapshot, and isolate
Endpoint Telemetry & Features
•writes/s, bytes/write, inter-write CV
•rename/create rate, unique inode touches
•dir breadth/fan-out, rolling byte entropy
•handle opens/closes, token/privilege changes
•SMB/IPC beacons, parent-child depth
Per-process in 2–5s windows
Featurization: robust scaling, outlier clipping, feature hashing (optional)
Classical
AI
Baseline
Temporal model
•TCN/GRU on short windows for
benign vs pre-encrypt suspicious
Calibrated probabilities
(Platt/Isotonic) for stable
thresholds
Low-latency inference path
(<5ms on CPU)
Quantum
Layer:
Novelty
via
Quantum
Kernels
Quantum feature map φ(x)
(e.g., ZZ-feature map)
•Compute kernel on 8–16D subset;
flag distance from benign manifold
Train with benign baseline;
batch kernel evaluations
async
Runs on simulator or small
real backend
QUBO
Canary
Placement
(Deception)
Graph model
•File tree + process
access graph →
coverage optimization
Objective:
minimize decoys /
maximize early hit
probability
Solve via
D-Wave/annealing
(or simulated
annealing fallback)
First suspicious
touch →
high-confidence
alert
Detection
Policy &
Automated
Actions
Stage 0 (Quantum novel,
AI uncertain)
•Throttle disk I/O, redirect to
sandbox, arm canaries
Stage 1 (Quantum + AI
agree)
•Suspend process, snapshot,
isolate, notify SOC
Maintain full forensic
trail
Data
Generation
& Safety
Benign corpus:
Office/IDE/builds/backups/AV
scans
Sandboxed ransomware
simulator: rapid renames &
entropy writes (no real harm)
Atomic pre-encryption tests
Evaluation
Plan &
KPIs
Overhead: CPU <3%, disk
<5%, zero kernel drops
FPR < 0.5%/endpoint-hour
under heavy benign I/O
TTD < 3s, PDR high before
irreversible writes
Implementation
Stage-6Report, demo, pilot
Stage-5Ablations, tuning, optional real backend
Stage-4Policy fusion & dashboard
Stage-3QUBO canary placement & decoy driver
Stage-2Quantum kernel prototype & integration
Stage-1Sensors + features + baseline AI