Methods For Speculatively Bootstrapping Better Intrusion Detection System Performance