This document discusses a hybrid approach using genetic algorithms and fuzzy logic to improve anomaly and intrusion detection. It begins with an overview of intrusion detection systems and discusses different types of database anomalies. It then describes techniques for intrusion detection including clustering, genetic algorithms, and fuzzy c-means clustering. The document presents the advantages of using a genetic algorithm for intrusion detection systems. It provides results of experiments measuring fit value and time using the hybrid genetic algorithm and fuzzy approach. The experiments showed this approach can accurately detect different attacks. The conclusion is that the hybrid genetic algorithm and fuzzy method was effective at anomaly-based intrusion detection within a network.