Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume XII Issue III

Author Name
Nikhil Chaurasia, Dr. Pritaj Yadav, Dr. Sanjeev kumar Gupta
Year Of Publication
2025
Volume and Issue
Volume 12 Issue 3
Abstract
The profound integration of informatisation and industrialization is amplifying security concerns regarding digital twins within industrial IoT (IIoT) network protocols. Current techniques for detecting vulnerabilities in network protocols, primarily based on feature mutation and fuzz testing, encounter drawbacks including reliance on expert experience and incapacity to address unknown protocols. This work concentrates on the automated analysis and formulation of vulnerability detection algorithms to tackle the issues of vulnerability detection for digital twins in IIoT protocols. A method for detecting network protocol vulnerabilities is proposed, utilising a combination of Generative Adversarial Networks (GANs) and mutation algorithms. A network protocol analysis model utilising GANs is employed to thoroughly extract information from message sequences, delineate message formats and associated attributes, and ascertain the structure of the network protocol.
PaperID
2025/IJTRM/03/2025/45510