Work | Security Threat | Detection Method | Strategy |
Amouri et al. [27] | Identifies Malicious Nodes | Machine learning | Using one tier |
Doshi et al. [28] | DDoS | Machine learning | Using one tier |
Lotfi et al. [29] | Identifying any unusual short term and long term activities | Machine learning | Using one tier |
Yamauchi et al. [4] | Unusual sequences of events | Machine learning | Using one tier |
Novak et al. [30] | Identify unusual short/long activities | Machine learning | Using one tier |
Proposed system | Identifies anomalies requests/unusual activities | Machine learning | Using two-tier |