International Journal of Applied Information Systems (IJAIS)
Genetic algorithms happen to be one of the preferred techniques for intrusion detection. It needs careful selection of its parameters like population size, number of generations, mutation rate, crossover rate, selection type, etc. and also requires selecting appropriate percentage of attack samples in a data set to be able to find good solutions. Choosing unsuitable parameters and methods might result into longer program runs or even bad optimization results. In the proposed method, genetic algorithm is used for intrusion detection rule generation.