Incorporating Soft Computing Techniques into Anomaly Intrusion Detection Systems