This document discusses intrusion detection systems (IDS) in cloud computing environments. It begins by defining cloud computing and describing its essential characteristics and deployment and service models. It then addresses security concerns in cloud computing, including threats from both insiders and outsiders. Next, it provides an overview of traditional IDS approaches, including host-based, network-based, and virtual machine-based systems. The document proposes several architectures for implementing IDS in clouds, including distributing sensors across cloud nodes, using a third-party monitoring service, integrating detection engines into cloud services, and taking a virtual machine-based approach. It concludes that the best approach combines behavioral and signature-based detection methods and can be implemented either by cloud providers or tenants