Digital Forensics Applied to K8S - Enhancing Intruder Dilemma