Sntrex is correct. You need to provide detail information about it. Intrusion detection happens anywhere in the world. If the application is not secure hackers might attack it. If you are looking intrusion detection information on cloud computing,
According to the 2009 Data Breach Investigations Report conducted by Verizon Business Risk Team, 64% of data breaches resulted from hacking and intrusions. Dedicated resources are expected to be more secure than shared resources. The attack surface in fully or partially shared cloud environments would be expected to be greater and cause increased risk. Enterprises need confidence and auditable proof that cloud resources are neither being tampered with nor compromised, particularly when residing on shared physical infrastructure. Operating system and application files and activities need to be monitored.
I would recommend you do do a search on cloud security as well.
Also, we have lots of article regarding cloud computing.
http://www.datacentertalk.com/catego...oud-computing/