Black hole traffic from the source of the attack

A source-based method is the preferred method by ISP. This would drop all traffic coming from the attackers to the customer's web server while allowing other legitimate traffic to go through. This can be a pretty nice solution if the source IP address is fixed, but the problem comes when today's sophisticated attack comes with constantly changing origins.