Skip to content

Commit 98c8f28

Browse files
false positive example
1 parent ec339cd commit 98c8f28

File tree

3 files changed

+48
-72
lines changed

3 files changed

+48
-72
lines changed

src/content/docs/ddos-protection/managed-rulesets/adjust-rules/false-positive.mdx

Lines changed: 0 additions & 55 deletions
This file was deleted.

src/content/docs/ddos-protection/managed-rulesets/adjust-rules/index.mdx

Lines changed: 0 additions & 13 deletions
This file was deleted.

src/content/docs/ddos-protection/managed-rulesets/http/http-overrides/override-examples.mdx

Lines changed: 48 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ You should identify the Managed Rule blocking the traffic and change the sensiti
2222

2323
If you have access to filter expressions, you can create an override to target the specific affected traffic.
2424

25-
2625
### Traffic is flagged by an adaptive rule based on the location and may be an attack
2726

2827
If you recognize that the traffic flagged by an adaptive rule may be considered an attack, you can create an override rule to enable the adaptive rule in mitigation mode to `challenge` (if it is browser traffic) or `block` (for other suspicious traffic).
@@ -42,7 +41,7 @@ To address a false negative:
4241
- If you are a WAF/CDN customer, follow the steps in the [Respond to DDoS attacks](/ddos-protection/best-practices/respond-to-ddos-attacks/) page, which guides you on enabling the _Under Attack_ mode and creating <GlossaryTooltip term="rate limiting">rate limiting</GlossaryTooltip> rules and WAF custom rules as needed.
4342
- If you are a Magic Transit customer, [use Magic Firewall rules](/magic-firewall/how-to/add-rules/) to help mitigate the attack.
4443

45-
## Incomplete mitigations
44+
### Incomplete mitigations
4645

4746
An incomplete mitigation is a case when the DDoS protection systems have applied mitigation, but not all the attack was mitigated. This can happen when Cloudflare's systems apply a mitigation action that is less strict than what the attack requires.
4847

@@ -73,12 +72,57 @@ If you are experiencing a DDoS attack detected by Cloudflare and the applied mit
7372

7473
Once saved, the rule takes effect within one or two minutes. The rule adjustment should provide immediate remedy, which you can view in the [analytics dashboard](/ddos-protection/reference/analytics/).
7574

76-
### Alternate procedure
75+
#### Alternate procedure
7776

7877
If you cannot stop an attack from overloading your origin web server using the above steps, [contact Cloudflare Support](/support/contacting-cloudflare-support/) for assistance, providing the following details:
7978

8079
- Time period of the attack (UTC timestamp)
8180
- Domain/path being targeted (zone name/ID)
8281
- Attack frequency
8382
- Steps to reproduce the issue, with actual results versus expected results
84-
- Any relevant additional information such as site URLs, error messages, screenshots, or relevant logs from your origin web server
83+
- Any relevant additional information such as site URLs, error messages, screenshots, or relevant logs from your origin web server
84+
85+
### Legitimate traffic is incorrectly identified as an attack and causes a false positive
86+
87+
A false positive is an incorrect identification. In the case of DDoS protection, there is a false positive when legitimate traffic is mistakenly classified as attack traffic. This can occur when legacy applications, Internet services, or faulty client applications generate legitimate traffic that appears suspicious, has odd traffic patterns, deviates from best practices, or violates protocols.
88+
89+
In these cases, Cloudflare’s DDoS Protection systems may flag that traffic as malicious and apply mitigation actions. If the traffic is in fact legitimate and not part of an attack, the mitigation actions can cause service disruptions and outages to your Internet properties.
90+
91+
To remedy a false positive:
92+
93+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com) and select your account.
94+
2. Go to the analytics dashboard and apply filters to the displayed data.
95+
<Details header="For WAF/CDN customers">
96+
3. Select the zone that is experiencing DDoS attack false positives.
97+
4. Go to **Security** > **Events**.
98+
5. Select **Add filter** and filter by `Service equals HTTP DDoS`.
99+
</Details>
100+
<Details header="For Magic Transit and Spectrum customers">
101+
6. Go to Account Home > **Analytics & Logs** > **Network Analytics**.
102+
7. Identify the legitimate traffic that is causing the false positives. Use the Attack ID number included in the DDoS alert (if you received one), or apply dashboard filters such as destination IP address and port.
103+
</Details>
104+
8. Scroll down to **Top events by source** > **HTTP DDoS rules**.
105+
9. Copy the rule name.
106+
10. Go to your zone > **Security** > **DDoS** and select **Deploy a DDoS override**. If you cannot deploy any additional overrides, edit an existing override to adjust rule configuration.
107+
11. Select **Browse rules** and paste the rule name in the search field.
108+
12. Decrease the rule’s **Sensitivity Level** to _Essentially Off_ or change the rule action to _Log_ (if supported by your current plan and subscriptions).
109+
13. Select **Next** and then select **Save**.
110+
111+
Once saved, the rule takes effect within one or two minutes. The rule adjustment should provide immediate remedy, which you can view in the [analytics dashboard](/ddos-protection/reference/analytics/).
112+
113+
#### Update the adjusted rules later
114+
115+
Later, you can change the [sensitivity level](/ddos-protection/managed-rulesets/network/override-parameters/#sensitivity-level) of the rule causing the false positives to avoid future issues, and change the rule action back to its default value.
116+
117+
:::note[Recommendation: Enable DDoS alerts]
118+
119+
Cloudflare recommends that you create notifications for [DDoS alerts](/ddos-protection/reference/alerts/) to get real-time notifications on detected and mitigated attacks automatically performed by Cloudflare’s systems. When you receive these notifications, you can review if it is in fact a real DDoS attack, or if it is a false positive, and then take action to remedy it.
120+
:::
121+
122+
#### Avoid false positives while retaining protection and visibility
123+
124+
To see what DDoS Managed Rules do in a high sensitivity level while remaining protected by blocking attacks at a low sensitivity level, Advanced DDoS protection customers can [create a first override](/ddos-protection/managed-rulesets/network/network-overrides/configure-dashboard/#create-a-ddos-override) that blocks attacks at a low sensitivity and a second override to log at a high sensitivity.
125+
126+
The overrides must be set in that order. Otherwise, it will not work. This is because overrides are evaluated in order and will stop at the first override that matches both expression and sensitivity. Setting the overrides in the wrong order would cause the `Log` override at a high sensitivity to match all instances. As a result, Cloudflare will never evaluate the `Block` override that would be placed behind it, causing all rules to be set in `Log` mode.
127+
128+
If an override without an expression matches, Cloudflare will not evaluate the expressions that follow it.

0 commit comments

Comments
 (0)