Fragmented packets are later reconstructed with the recipient node with the IP layer. They are then forwarded to the appliance layer. Fragmentation attacks generate malicious packets by replacing info in constituent fragmented packets with new knowledge. – Jon Hanna Commented Jan 26, 2013 at 21:forty one @FumbleFingers I'd use neither https://ids96317.rimmablog.com/32643415/ids-an-overview