At our organization, we use a web application firewall (the Application Security Module [ASM] from F5) to block these kinds of requests. It works by first learning a database of acceptable URLs. It is intelligent enough to figure out all of the static links as well links which may be variable. For example, if a token or unique ID is included with a request, it will enforce limits on the length of that in the URL based on what it has seen in the past. Furthermore, it has a regularly updated database of other things it watches out for, such as SQL or BASH in a URL or user agent string.
While you may not be vulnerable right now to the types of attacks you are seeing, you cannot guarantee you will not be vulnerable in the future or that you are vulnerable to something that you simply have not seen yet or is yet undiscovered. Furthermore, something like this solution can help to guard against DDoS attacks. You know that you are regularly being targeted and this does incur some cost in processing on your infrastructure that could be lessened. If you know you are regularly being targeted either 1) someone is really trying very hard to get in there, 2) you are an obvious target or 3) you are a high value target. Most commonly it is 2) and most commonly it is from a wide range of source IPs and therefore not easily blocked.
As to whether it is worth the money to do so, that is really a business decision. You must weigh the cost of a potential breach against the cost of the solution or solutions, much like having an insurance policy. It may not cover all situations and it may never pay off to have it. Or it may be the thing that saves you.