1]杨健康, 张建伟. 分布式拒绝服务攻击的攻击树建模[J]. 装备指挥技术学院学报, 2004, 15(6): 9598[2]Lee Yeonhee, Lee Youngseok. Detecting DDoS attacks with Hadoop[C] Proc of the ACM CoNEXT Student Workshop. New York: ACM, 2011[3]杨飞. 基于Hadoop的分布式视频大数据前景检测与运动跟踪方法研究[D]. 重庆: 重庆大学, 2013[4]李宽. 基于HDFS的分布式Namenode节点模型的研究[D]. 广州: 华南理工大学, 2011[5]Borthakur D. The hadoop distributed file system: Architecture and design[J]. Hadoop Project Website, 2007, 11(11): 110[6]CSDN. 福布斯: Hadoop——你不得不了解的大数据工具[EBOL]. [20120220]. http:www.csdn.netarticle20120220312061[7]Herodotou H. Hadoop performance models[OL]. [20151110]. http:xueshu.baidu.coms?wd=paperuri%3A%2834cddc73ef6f771116ed1d27869e90a5%29[8]Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[J]. Proceedings of Operating Systems Design and Implementation (OSDI), 2004, 51(1): 107113[9]Ekanayake J, Pallickara S, Fox G. MapReduce for data intensive scientific analyses[C] Proc of the 4th IEEE Int Conf on eScience (eScience08). Piscataway, NJ: IEEE, 2008: 277284[10]Kavulya S, Tan J, Gandhi R, et al. An analysis of traces from a production MapReduce cluster[C] Proc of the 14th IEEEACM Int Symp on Cluster, Cloud and Grid Computing. Piscataway, NJ: IEEE, 2010: 94103