Assist in identifying DDoS attacks, false positives, and necessary adjustments to anti-DDoS thresholds and damping rules.
Within the Anti-DDos module, access the Overview or Active Anomalies tab in Anti-DDos to check for currently active anomalies:
 
 
If there are anomalies, give priority to the most recent ones for analysis. This may indicate:
To view the history, go to the Attack History tab, where alerts are listed from the most recent to the oldest occurrence:
 
 
In the history, information such as target, type, direction, protocol, etc. is displayed:
 
 The redirection to the statistics applies to all information presented in blue links:
 
 
 Damping rules are configured within the Anti-DDos settings tab.
 Use the Made4Flow graphs to validate that the anomaly corresponds to traffic spikes.
 If the difference between the total traffic and the attack is large (ex: 300G) and the attack (ex: 1G), the anomaly may not be evident from this graph, due to the proportion of the values.
Anomalies of Port 0 (UDP), DNS 53 (UDP), HTTPS 443 (TCP), HTTP 80 (TCP), SMTP 25 (TCP), SNMP 161 (UDP), SSH 22 (TCP), Telnet 23 (TCP), etc., the App graph can be used, where it is possible to view traffic directly through these applications:
 
 
SYN flood anomalies, the TCP flags general graph can be used, where it is possible to filter the SYN flags and view specific traffic:
 
 
TCP flood, UDP flood or “Generic” anomalies - which consider total traffic regardless of protocol and port, for these cases the General Traffic graph can be used, where filters can be defined by interface:
 
 
Another widely used graphic is Prefix, where the possibility of filters is based on the quantity and granularity of your prefixes registered in Made4flow:
 
 
 In addition to the other possible filters, the Output Values: Bits per Second or Packets per Second and also the Custom Interval are very useful.
The raw data represents traffic details collected in the last 5 minutes of the period selected in the graph.
 For the data to be analyzed by the tool, all interfaces that have traffic and that you wish to monitor must have the netflow export settings applied to the equipment and be as monitored when registering the equipment in Made4flow.
![]()
If the graphs do not show any peaks or abnormal patterns, the anomaly alerted is certainly a false positive.
Return to the Anti-DDos anomaly details screen and “write down” the values of:
 Open the thresholds tab, select the threshold that was alerted, in the Speedtest example.
Order the rules by the column of decoders to make it easier to find.
Adjust the exceeded rule, increasing the value about ** 10% above what was alerted**. In the example from the previous image, the DNS rule of packets per second for Threshold Speedtest Subnet detection was defined as 250 pps, the value exceeded was 291 pps, increasing approximately +10%, and we have the new value of 320 pps:
 
 
After adjusting it is necessary to apply the changes:
 By following this process, it is possible to identify more precisely whether an alert is in fact an attack or a false positive, guaranteeing more assertive actions and avoiding unnecessary advertisements.