This document discusses using a genetic algorithm to improve intrusion detection systems. It begins with an overview of intrusion detection systems and their classification as network-based or host-based. It then discusses genetic algorithms and how they can be applied to intrusion detection. Specifically, genetic algorithms can be used to generate rules for detecting normal and anomalous network connections in order to reduce false positives. The document concludes that implementing genetic algorithms in intrusion detection systems can help generate new rules dynamically and reduce the need for administrators to manually track and update rules.