Fragmented packets are later on reconstructed because of the receiver node in the IP layer. These are then forwarded to the application layer. Fragmentation attacks make destructive packets by changing data in constituent fragmented packets with new information. Fred Cohen observed in 1987 that it's impossible to detect an intrusion https://ids64185.gigswiki.com/5469144/5_essential_elements_for_ids