Watch this video on YouTube
A penetration tester is trying to evade an IDS by introducing delays between the transmission of packet fragments to avoid detection. What technique is being employed?