This is probably not normal traffic. It is trivial for someone to forge the source IP of a UDP packet on the internet, and 8.8.8.8 is an easy one to remember and use for that purpose. However, as replies are sent to the source IP, it's not clear what the benefit would be for somebody to use that as the source IP for a port scan (you don't say whether this alarm was for traffic to the same port on multiple IPs, or to a variety of ports on one IP, or a variety of ports on multiple IPs).
More likely, somebody was forging your IP address as the source for DNS queries to 8.8.8.8 and Google Public DNS was sending replies to you. This sort of reflection (or amplification) can be used in a Denial of Service attack, and although there are various techniques to detect this and mitigate it (mostly by dropping responses, but also potentially sending back truncated responses) it is certainly possible for some traffic to get in "under the radar" and trigger alarms on targeted devices before the traffic is detected and blocked.