Use of well-known misuse patterns that can guide the discovery of new threats to the Big Data ecosystem