1Sanjay Srivastava, 2Dr.Manish Varshney

1Research Scholar, Department of Computer Science, Maharshi University of Information Technology, Lucknow 2Professor, Department of Computer Science,

Maharshi University of Information Technology, Lucknow,


The Internet of Things (IoT) revolutionized the global network comprising of people, smart devices, intelligent objects, information, and data. It is no secret that as more and more devices connect to the internet, the challenges of securing the data that they transmit and the communications that they initiate are becoming more profound. In this century of automation, automation, which is digitized and more and more technology is applied, makes people’s lives easier. When individuals feel unsafe on the Internet, they are less likely to use it, which is the situation currently. When it comes to gadgets and sensors, the “Internet of Things” IoT has made this possible. There has been an increase in the production of compact, low-cost sensors as a result of advances in sensor technology. Temperature, pressure, vibration, sound, and light are a few examples of sensors that may be utilized in the Internet of Things. Increasingly powerful IoT applications are being developed as a consequence of the continuous improvement of IoT sensors with each new generation. As a result, discussing their security concerns and risks might be difficult. There are several advantages and disadvantages to IT applications that are discussed in this article. One- hundred-and-ninety-nine percent of the papers analyzed considered cost the most important consideration when assessing IoT applications, followed by real-tameness (64 percent) and security and error (57 percent). DDoS assaults, an in-depth look into DDoS assaults on IoT devices, the consequences of DDoS attacks, and mitigation methods are presented in this article. Detection models for DDoS assaults are compared in this review article, which focuses on Intrusion Detection models. Also given were several IDS classifications, multiple anomaly detection methodologies, various IDS models created from datasets, and various machine learning and deep learning algorithms for data pre-processing and malware detection. As a result of the discussion on research difficulties, solutions provided, and future aspirations, a larger viewpoint has been envisioned.

KEYWORDS: “Internet of Things”; Industrial IoT; Smart manufacturing; Threats Future technology.