Fragmented packets are later on reconstructed through the receiver node in the IP layer. These are then forwarded to the applying layer. Fragmentation attacks produce malicious packets by replacing details in constituent fragmented packets with new data. Whenever we classify the look on the NIDS according to the procedure interactivity https://bookmarkforest.com/story18994702/fascination-about-ids