This document provides a comprehensive survey on using clustering techniques in intrusion detection systems (IDS) for cybersecurity. It reviews 30 research papers, evaluating various datasets, techniques, and their effectiveness, while discussing the strengths and weaknesses of different clustering methodologies like hierarchical and partitional clustering. The paper emphasizes the growing importance of network security amidst increasing cyber threats and highlights key issues in current datasets used for IDS evaluation.