| Work | Security Threat | Detection Method | Strategy |
| Amouri et al. [27] | Identifies Malicious Nodes | Machine learning | Using one tier |
| Doshi et al. [28] | DDoS | Machine learning | Using one tier |
| Lotfi et al. [29] | Identifying any unusual short term and long term activities | Machine learning | Using one tier |
| Yamauchi et al. [4] | Unusual sequences of events | Machine learning | Using one tier |
| Novak et al. [30] | Identify unusual short/long activities | Machine learning | Using one tier |
| Proposed system | Identifies anomalies requests/unusual activities | Machine learning | Using two-tier |