The Security Monitoring System focuses on authentication-based attacks. For DDoS protection, you should implement additional measures at the network/server level (firewall rules, CDN, rate limiting).
Save this interesting page on your Favorite Social Media