In order to cope with false alarms, we experiment with different threshold values for each attack graphlet. We find appropriate thresholds for detecting each attack, assuming a two-minute analysis interval. For each graph, we generate five sets of single attack traffic on real background traffic collected at the same location as experiment II, and compute average accuracy at different thresholds. Figure 5 shows effects of different threshold values to the false positive of detection.