Provenance-based Intrusion Detection: Opportunities and Challenges