Applying evolutionary methods for the optimization of an intrusion detection system to detect anomalies in network traffic flows