Fragmented packets are later reconstructed because of the recipient node with the IP layer. They are then forwarded to the appliance layer. Fragmentation assaults deliver malicious packets by replacing info in constituent fragmented packets with new knowledge. – Jon Hanna Commented Jan 26, 2013 at 21:40 one @FumbleFingers I'd use https://ids41863.wikilinksnews.com/5872773/little_known_facts_about_ids