What are a couple of examples of AETs?
Technical: Consider the well known method of packet fragmentation, this alone would be caught. However, if this is combined with random IP options and a manipulation of how data is interpreted on the target, the attacker can successfully deliver a payload containing any attack. Basic: The stealth capability of AETs could be used in conjunction with existing worms (Stuxnet, Zeus or Conficker, for example) to make attacks more powerful than ever before seen.