Analysis of Cloud Network Intrusion Issue and a Feasible Detection Methodology