As the Android system is based on the Linux kernel, so it
there exists a lot of vulnerabilities like Linux, it has become
the focus of the current target attacked by hackers. Because
it exist loophole, hackers have developed a number of
exploits to steal users' privacy, deductions and other
malicious software. The malicious software can start
malicious processes in the background through automatic
network. It stole the privacy content of mobile telephones
and directly threat user's security.Intrusion detection system
framework is designed as the following in figure 2: