Genetic Algorithm-based Fuzzy Soft Computing in Cybersecurity: A Review

Authors

  • Subhasini Shukla
  • Sanskruti Newalkar
  • Prinkal Bari
  • Mohamad Rehan Bilal Shaikh
  • Anuj Golhar
  • Yash Kulkarni

Abstract

With the rapid digitization of personal, financial, healthcare, and governmental infrastructures, cybersecurity has emerged as a critical global priority. As cyber threats become increasingly sophisticated, dynamic, and unpredictable, traditional intrusion detection systems (IDS) face significant limitations. Most conventional IDS models rely on fixed rule-based mechanisms and binary machine learning classifiers that categorize activities strictly as either legitimate or malicious. This rigid decision-making approach often fails to effectively address the uncertainty, ambiguity, and incomplete information commonly present in real-world network traffic. As a result, such systems tend to generate high false positive rates and struggle to detect novel or evolving attack patterns. Although several anomaly detection techniques have been introduced, many lack adaptability and the capability to manage imprecise data efficiently. To overcome these challenges, this study proposes a genetic algorithm-based fuzzy soft computing approach for cybersecurity. By integrating fuzzy logic’s strength in handling uncertainty with the optimization capability of genetic algorithms, the proposed framework aims to improve detection accuracy, minimize false alarms, and enhance adaptability. This research contributes toward developing a more intelligent, flexible, and robust intrusion detection system suitable for securing modern digital environments against continuously evolving cyber threats.

References

S. Anusooya, N. Revathi, P. Sivakamasundari, A. N. Duraivel, and S. Prabu, “A hybrid genetic algorithm and neural network-based cyber security approach for enhanced detection of DDoS and malware attacks in wide area networks,” Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 253–262.

Z. Halim et al., “An effective genetic algorithm-based feature selection method for intrusion detection systems,” Computers & Security, vol. 110, p. 102448, Nov. 2021.

M. S. Abadeh, H. Mohamadi, and J. Habibi, “Design and analysis of genetic fuzzy systems for intrusion detection in computer networks,” Expert Systems with Applications, vol. 38, no. 6, pp. 7067–7075, Jun. 2011.

I. Gaied, F. Jemili, and O. Korbaa, “Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study,” in Proc. 25th Int. Conf. Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, Sep. 2017, pp. 1–6.

K. Chadha and S. Jain, “Hybrid genetic fuzzy rule-based inference engine to detect intrusion in networks,” in Advances in Intelligent Systems and Computing, vol. 339, Cham, Switzerland: Springer, 2015, pp. 185–198.

R. Elhefnawy, H. Abounaser, and A. Badr, “A hybrid nested genetic-fuzzy algorithm framework for intrusion detection and attacks,” IEEE Access, vol. 8, pp. 98218–98233, 2020.

M. S. Abadeh, J. Habibi, and C. Lucas, “Intrusion detection using a fuzzy genetics-based learning algorithm,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 414–428, Jan. 2007.

C.-H. Tsang, S. Kwong, and H. Wang, “Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework,” in Proc. 5th IEEE Int. Conf. Data Mining (ICDM), Houston, TX, USA, Nov. 2005.

S. Subramani and M. Selvi, “Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks,” International Journal of Information and Computer Security, vol. 20, no. 3–4, pp. 439–461, Feb. 2023.

A. T. Haghighat, M. Esmaeili, A. Saremi, and V. R. Mousavi, “Intrusion detection via fuzzy-genetic algorithm combination with evolutionary algorithms,” in Proc. 6th IEEE/ACIS Int. Conf. Computer and Information Science (ICIS), Melbourne, Australia, Jul. 2007, pp. 587–591.

Published

2026-04-07

How to Cite

Shukla, S., Newalkar, S., Bari, P., Rehan Bilal Shaikh, M., Golhar, A., & Kulkarni, Y. (2026). Genetic Algorithm-based Fuzzy Soft Computing in Cybersecurity: A Review. Journal of Cyber Security in Computer System, 5(1), 53–61. Retrieved from https://matjournals.net/engineering/index.php/JCSCS/article/view/3394