Hello Abhishek, The problem isn't doing the attack. The problem is evaluating the effect of the attack.
Since NetSim is a discrete event simulator and application delays (i.e., the time required to process an event - is never considered, the server will be able to process all the incoming pings, TCP SYN etc. up to its internal buffers, which are nearly infinite.
So, my answer is that one cannot trust too much the results. Unless you have a deep knowledge of the NetSim DES Engine, and buffers work.
If you have any existing paper which explains the implementation of a DOS attack in a Network Simulator, one could look at that and see if something similar can be done in NetSim.
In any case you must be good in C and have a knowledge of NetSim's internal working to do the same.
This may be possible if you can add some processing delay in the IP/TCP layer for responding to the DOS attacks. This should be doable in NetSim but you should know the working of NetSim's code or you can ask their tech support team.
Fig. 7932 shows that the special CoAP messages CON and ACK are transmitted on layer 5a "CoAP Messages". CON and ACK extend the "unreliable UDP transport service" to the "reliable CoAP transport service". The timeout mechanism plays an important role in this case (see Fig. 7936).
The retransmission parameters ATO and ARF can be maliciously changed - so that timeout has a relatively large value. As a result, the performance of CoAP can be influenced very strongly negatively.
For example, manipulating the MAX_RETRANSMIT parameter by setting it to 0 or 1 would also significantly reduce the performance of CoAP.
The DoS attacks as a result of the malicious changes made by CoAP Responses.
This type of DoS Attack can be done by sending a negative CoAP Response (of type Client Error 4.xx or Server Error 5.xx) instead of a positive CoAP Response (of type Success 2.xx).
See my CoAP presentation "CoAP_Messages - Structure and Types"