Analysis of Boosting Mechanisms in Cloud-based Intrusion Detection Systems