Abstract-This paper one of the series of papers in which we lay down the foundations for design of trustworthy computing systems. We propose here a methodology to perform behavior-based intrusion detection on security protocols using fuzzy relational methods. Fuzzified Allen temporal algebra plays an important role in capturing the time dimension of concurrent activites of principals as well as of intruders.