Input:
  SN: Set of sensor nodes for cluster head selection
  : Number of rounds
  Simulation Parameters of LEACH protocol
Output:
  DDoS Attack Dataset
Procedure DDoSAttackAlgorithm(SN, )
BEGIN:
   IF
    Initial round selection
   FOR maximum number of rounds “
    Choose rounds randomly
     announces schedule time to all SN
   END-FOR
   Attach attack code with random nodes
   Randomly initiates malicious nodes towards victim node
    Malicious nodes start and stop randomly according to time during formation
   Malicious nodes start compromise victim node
    Malicious nodes forward flooding packets to with high rate to overflow and consume resources available to victim
    Victim node receives packet with high rate
   More malicious nodes start compromising victim at their schedule time causing DDoS flooding attack
END:
Algorithm 6: DDoS attack algorithm.