Handle a false positive
A false positive is an incorrect identification. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols.
In these cases, Cloudflare’s DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
To remedy a false positive:
Navigate to the analytics dashboard and apply filters to the displayed data.
For WAF/CDN customers
1. Select the zone that is experiencing DDoS attack false positives.
2. Navigate to Security > Events.
3. Select Add filter and filter by
Service equals HTTP DDoS.
For Magic Transit and Spectrum customers
1. Go to Account Home > Analytics & Logs > Network Analytics.
2. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
Scroll down to Top events by source > HTTP DDoS rules.
Copy the rule name.
Navigate to Security > DDoS and select Configure next to the managed ruleset containing the rule you will adjust.
Select Browse rules and paste the rule name in the search field.
Decrease the rule’s Sensitivity Level to Essentially Off or change the rule action to Log.
Select Next and then select Save.