Work

Security Threat

Detection Method

Strategy

Amouri et al. [27]

Identifies Malicious Nodes

Machine learning

Using one tier

Doshi et al. [28]

DDoS

Machine learning

Using one tier

Lotfi et al. [29]

Identifying any unusual short term and long term activities

Machine learning

Using one tier

Yamauchi et al. [4]

Unusual sequences of events

Machine learning

Using one tier

Novak et al. [30]

Identify unusual short/long activities

Machine learning

Using one tier

Proposed system

Identifies anomalies requests/unusual activities

Machine learning

Using two-tier