Malware log files for Internet investigation using hadoop: A review | IEEE Conference Publication | IEEE Xplore