Which of the following mitigation strategies would be BEST to prevent this attack from being successful?