Technology development has made cyber-security threats more sophisticated, to the point where the detection mechanisms in place are unable to handle the problem. Therefore, the key to solving this issue would be the deployment of a clever and potent intrusion detection system. They monitor computer networks by gathering and evaluating data and information, recognizing user activity and automatically defending against attacks. There is an increasing need for countermeasures for prevention, detection, and protection due to the complexity of computer networks and harmful attacks. The problem of incorrect judgment, incorrect detection, and unsuccessful lack of a consistent response to the attack is one of the essential tests for intrusion detection. The conventional cryptographic security protocols are seriously threatened by the emergence of large-scale quantum computing. They become useless due to quantum assaults, which specifically target the mathematical underpinnings of existing asymmetric cryptography techniques. Longer keys or longer hash function outputs could potentially improve security, making even basic symmetric key cryptography vulnerable, if only slightly. As a result, the cryptographic techniques currently used to protect data will no longer be sufficiently safe and will be exposed to new risks posed by quantum technology.