This document summarizes and compares different clustering algorithms that can be used for network anomaly detection. It proposes a method that first applies clustering algorithms like k-means, hierarchical, and expectation maximization clustering to partition network traffic data into clusters. It then applies the ID3 decision tree algorithm on each cluster to classify instances as normal or anomalous. The performance of this combined method is compared to using just the clustering or ID3 algorithms individually. Real network data sets are used to evaluate performance based on various metrics. The combined method is found to outperform the individual algorithms. The document also reviews several other related works applying clustering and decision trees for network anomaly detection and privacy-preserving data mining.