This document presents a comparative study of various intrusion detection systems (IDS) for smartphones, highlighting the increasing security threats due to the popular use of these devices. It discusses the limitations of smartphones in executing complex detection algorithms and suggests cloud-based solutions as an effective measure for enhanced security. The paper reviews existing IDS frameworks and techniques, emphasizing the need for a combination of anomaly and signature-based approaches for optimal protection against malicious attacks.