Black hole traffic from the source of the attack

A source-based method is the preferred method by ISP. This would drop all traffic coming from the attackers to the customer's web server while allowing other legitimate traffic to go through. This can be a pretty nice solution if the source IP address is fixed, but the problem comes when today's sophisticated attack comes with constantly changing origins. 

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.