Introduction - If you have any usage issues, please Google them yourself
In this paper, the IP linux assembly algorithm analysis, because the IP fragments are often used in attacks such as DOS, later in the article I combine several attack methods are further described