Ok, dumb question:<p>Why can't a list of addresses of all the devices in the world of the type used in the attack be created, and all packets from any address on the list be trashed? At least, for the duration of the attack.<p>If such lists were made ahead of time, they could be turned on rapidly.<p>Is anything like this done?