how to handle attacks by abused systems