Fragmented packets are later reconstructed through the receiver node with the IP layer. They can be then forwarded to the applying layer. Fragmentation attacks generate destructive packets by changing info in constituent fragmented packets with new data. It is trying to protected the online server by frequently checking the HTTPS protocol stream