Ask HN: Intruder detection 101 in cloud environments – where to start?