Ask HN: Intruder detection 101 in cloud environments – where to start? | Dark Hacker News