Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

Table 8

Comparison performance.

CharacteristicTaintDroid [12]CrowDroid [11]RobotDroid [16]MDTN

Detection techniquesAnomaly detectionBehavior based-dynamic analysisSupport vector machine active learning algorithmBehavior based-static analysis
Operating systemTaintDroidAndroidAndroidAndroid
Kernel levelYesNoNoNo
Real time monitoringYesNoNoYes
Tracking systemYesNoNoYes