Then the attacker finds no one home. I don't want to repeat prior discussions since you know you can not stop such attacks. No need to repeat that finding.

Be sure all your machines are not running TORRENT software since one of the tactics they use is to do exactly what you asked about.
Bob