Title :
Study on Kerberos protocol based on fuzzy control
Author_Institution :
Dept. of Comput. Sci. & Technol., Dezhou Univ., Dezhou, China
Abstract :
In order to prevent password attack and replay attack existing in Kerberos protocol, the traditional method was to make use of encryption techniques and authentication techniques on enhancing the security of protocol itself, but it was failure to prevent protocol´s external factors of impacting on security. In this regard, this paper proposes to use of the method of fuzzy control to realize the security identification of Kerberos protocol by embedding three fuzzy controllers and a system health and safety validator (SHSV) in the protocol; wherein the SHSV is to collect the health and security information in the client, whereas the three fuzzy controllers are using to process and determine the external security factors of the relevant servers respectively. This proposed method can be able to effectively realize on assessment and prevention from the potential and existing threats caused by protocol´s external factors of security.
Keywords :
cryptographic protocols; fuzzy control; Kerberos protocol; authentication; encryption; fuzzy controllers; password attack prevention; protocol security; replay attack; security identification; system health and safety validator; Access protocols; Authentication; Computer security; Control systems; Fuzzy control; Fuzzy systems; Health and safety; Information security; Input variables; Protection; fuzzy control; kerberos protocol; network access control; password attack; replay attack;
Conference_Titel :
Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on
Conference_Location :
Sanya
Print_ISBN :
978-1-4244-4247-8
DOI :
10.1109/CCCM.2009.5270449