This paper discusses the need for new methodologies in cyber threat detection systems due to the increasing volume and speed of data generated by future...