Fragmented packets are later on reconstructed from the receiver node within the IP layer. They may be then forwarded to the applying layer. Fragmentation assaults create destructive packets by changing data in constituent fragmented packets with new knowledge. Log File Analyzer: OSSEC serves to be a log file analyzer, actively monitoring and exa