Research Article
An Analysis of Security System for Intrusion in Smartphone Environment
Table 8
Comparison performance.
| Characteristic | TaintDroid [12] | CrowDroid [11] | RobotDroid [16] | MDTN |
| Detection techniques | Anomaly detection | Behavior based-dynamic analysis | Support vector machine active learning algorithm | Behavior based-static analysis | Operating system | TaintDroid | Android | Android | Android | Kernel level | Yes | No | No | No | Real time monitoring | Yes | No | No | Yes | Tracking system | Yes | No | No | Yes |
|
|