Fragmented packets are afterwards reconstructed via the recipient node for the IP layer. They may be then forwarded to the appliance layer. Fragmentation assaults generate malicious packets by changing facts in constituent fragmented packets with new data. Fred Cohen famous in 1987 that it's extremely hard to detect an intrusion in just about ev