This document discusses using decision tree techniques for automating intrusion detection systems. It begins with an introduction to intrusion detection systems and their taxonomy. It then discusses some drawbacks of current intrusion detection systems, including an inability to detect novel attacks and issues with data overload, false positives, and false negatives. The document proposes that data mining techniques like decision trees can help address these issues. It provides definitions of data mining and decision trees, and outlines a process for implementing decision tree analysis on network data to build a model that can incorporate rules into intrusion detection systems.