The ABC Company has suffered from repeated attacks on its Web site. In the most recent attack, the server was suddenly bombarded by requests to view Web pages. The number of requests was so large that it caused an overflow in the activity log after the first hour. The Web manager estimated that the total number of requests exceeded 4 million, but she would never know for sure because the entire Web server crashed after 45 minutes. One of the analysts inspected the remains of the activity log and quickly discovered that all the requests came from a small group of IP addresses.
Describe what types of measures might be taken to protect the ABC Company against subsequent attacks of this nature.