Intrusion Detection Methods Using an Ensemble of Decision Trees