Notice Board :

Call for Paper
Vol. 12 Issue 9

Submission Start Date:
September 01, 2025

Acceptence Notification Start:
September 10, 2025

Submission End:
September 20, 2025

Final MenuScript Due:
September 28, 2025

Publication Date:
September 30, 2025
                         Notice Board: Call for PaperVol. 12 Issue 9      Submission Start Date: September 01, 2025      Acceptence Notification Start: September 10, 2025      Submission End: September 20, 2025      Final MenuScript Due: September 28, 2025      Publication Date: September 30, 2025




Volume XII Issue III

Author Name
Nikhil Chaurasia, Dr. Pritaj Yadav, Dr. Sanjeev kumar Gupta
Year Of Publication
2025
Volume and Issue
Volume 12 Issue 3
Abstract
The profound integration of informatisation and industrialization is amplifying security concerns regarding digital twins within industrial IoT (IIoT) network protocols. Current techniques for detecting vulnerabilities in network protocols, primarily based on feature mutation and fuzz testing, encounter drawbacks including reliance on expert experience and incapacity to address unknown protocols. This work concentrates on the automated analysis and formulation of vulnerability detection algorithms to tackle the issues of vulnerability detection for digital twins in IIoT protocols. A method for detecting network protocol vulnerabilities is proposed, utilising a combination of Generative Adversarial Networks (GANs) and mutation algorithms. A network protocol analysis model utilising GANs is employed to thoroughly extract information from message sequences, delineate message formats and associated attributes, and ascertain the structure of the network protocol.
PaperID
2025/IJTRM/03/2025/45510