Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication