Configure the firewall to filter out the IP address of the intruder. However, this still allows the intruder to attack from other addresses.