I'd say a DDOS attack is less likely with DPOS than it is with Bitcoin's PoW. It is harder for a hacker to find out delegates IP addresses than Ghash or discus fish IP addresses, as there are many delegates and delegates don't have public facing web sites and pool information. All delegate's identities are not publicly known.
You are ignoring many other variables like CDN's, Firewalls, available bandwidth, network security specialists, quality of the server configuration, and the fact that miners have fallback pools that they instantly mine on if their primary pool gets hit with a DDOS attack.
The delegates likely have none of these benefits and thus could easily be knocked down with a small botnet.
Yes, many of the delegates are publicly known with a degree of probability.... I can produce a list of names that I can DOX with a likely 80-90% probability that they are a delegate. I don't need to have 100% confidence to what delegate username matches with the actual delegate to attack them. In the future I would also suspect delegates that are publicly recognized would tend to garner more support and more votes so this makes them even more vulnerable to being manipulated.
I believe you are good intentioned with trying to help people but you really are unfamiliar with network security as evidenced in this thread. People that understand good security are humble, as everything is vulnerable. Notice how I repeatedly mention how and why bitcoin is vulnerable?
FYI.... I like DPOS in reality and think there is a very important function for the coin. I am just trying to help people see through the propaganda.
You can produce a list of names, not IP addresses. You would then need to compromise those people's computers to get the IP address of their delegate server, no? There is an added layer of security there, whereas I can get the IP addresses for all Bitcoin pools with 10 minutes worth of work as pool addresses are much easier attainable. I think you are making it out to be easier than it actually is.
Even if you were able to figure out the IPs of 80% to 90% of the delegate servers and DDOS them, all it would do is slow down the network.. It wouldn't make it vulnerable to attack. When one delegate misses a block, the next delegate includes their block and the previous missed block into the block chain. I believe in the unlikely event that 80 or 90 consecutive (likely it would be less because it is extremely unlikely that the delegates turns for that specific round were in exactly that order) blocks were missed, they would be recorded by the 81st or 91st delegate into the block chain.
It seems like a lot of work to only inconvenience the chain (slow it down.) Whereas a DDOS on the pools of a PoW coin can have security implications because then less hash power is needed to mount a possible attack.