Intrusion detection system in cloud computing: Challenges and opportunities