J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment, Journal of Internet Services and Information Security, vol.3, issue.34, pp.28-37, 2013.

A. Oliner, A. Ganapathi, and W. Xu, Advances and challenges in log analysis, Communications of the ACM, vol.55, issue.2, pp.55-61, 2012.
DOI : 10.1145/2076450.2076466

G. Yunhua, S. Shu, and Z. Guansheng, Application of NoSQL Database in Web Crawling, International Journal of Digital Content Technology and its Applications, vol.5, issue.6, 2011.

M. Elkotob and K. Andersson, Cross-Layer Design for Improved QoE in Content Distribution Networks, IT CoNvergence PRActice(INPRA), vol.1, issue.1, pp.37-52, 2013.

V. Srinivasan and B. Bulkowski, Citrusleaf: A Real-Time NoSQL DB which Preserves ACID, The 37th International Conference on Very Large Data Bases Proceedings of the VLDB Endowment, pp.1340-1350, 2011.

X. Yi, G. Wei, and F. Dong, A Survey on NoSQL Database, Communication of modern technology, pp.46-50, 2010.

W. Zhou, J. Han, Z. Zhang, and J. Dai, Dynamic Random Access for Hadoop Distributed File System, 2012 32nd International Conference on Distributed Computing Systems Workshops, pp.17-22, 2012.
DOI : 10.1109/ICDCSW.2012.74

L. George, HBase The Definitive Guide, O`ReillyMedia, 2011.

C. Bomin, K. Jong-hwan, H. Sung-sam, and H. Myung-mook, The Method of Analyzing Firewall Log Data using MapReduce based on NoSQL, Journal of The Korea Institute of Information Security & Cryptology(JKIISC), vol.23, issue.4, pp.667-677, 2013.

J. Yang and J. Leskovec, Patterns of temporal variation in online media, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.177-186, 2011.
DOI : 10.1145/1935826.1935863

K. Shvachko, HDFS Scalability: The limits to growth, login, vol.35, issue.2, pp.6-16, 2010.

D. Borthakur, J. S. Sarma, and J. Gray, Apache Hadoop goes realtime at Facebook" SIGMOD, pp.1071-1080, 2011.
DOI : 10.1145/1989323.1989438

B. Proffitt, When NoSQL Databases Are Yes Good For You And Your Company, 2013.

M. Agosti, F. Crivellari, and G. M. Nunzio, Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction, Data Mining and Knowledge Discovery, vol.8, issue.4, pp.663-696, 2012.
DOI : 10.1007/s10618-011-0228-8

C. Choi, J. Choi, B. Ko, K. Oh, and P. Kim, A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments, Journal of Internet Services and Information Security, vol.2, issue.34, pp.54-64, 2012.

J. Herrerias and . Gomez, Log Analysis Towards an Automated Forensic Diagnosis System, 2010 International Conference on Availability, Reliability and Security, pp.15-18, 2010.
DOI : 10.1109/ARES.2010.120

S. Han and Y. Han, Meaning and Prospects of IT Convergence Technology in Korea, IT CoNvergence PRActice(INPRA), vol.1, issue.1, pp.2-12, 2013.

S. Gonzalez-miranda, R. Alcarria, T. Robles, A. Morales, I. Gonzalez et al., An IoT-leveraged information system for future shopping environments, IT CoNvergence PRActice(INPRA), vol.1, issue.3, pp.49-65, 2013.