Application of Intrusion Tolerant Techniques to Authentication System
-
Graphical Abstract
-
Abstract
In combination with a scalable intrusion tolerance architecture for distributed service (SITAR) and intrusion tolerant password authentication system(ITPAS), this paper describes an architecture of distributed password authentication system which is intrusion tolerant. Intrusion tolerance and prevention of dictionary attacks are realized by means of redundancy, diversity, proxy, secret sharing, and distributed intrusion detection techniques.
-
-