Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
How would you describe an attack where an attacker attempts to deliver the payload over multiple packets ?