As a Security Specialist, you have received an alert from a log analyzer about the suspicious increase in traffic to your application’s login page probably indicating a potential brute force or credential-stuffing attack against the application. The application under attack is configured behind a Web Application Firewall (WAF) using Amazon CloudFront and Amazon S3. What should be the initial response to this probable attack?