Certain application-layer protocols that rely on the User Datagram Protocol (UDP) have been identified as potential attack vectors. These include
(1)
(2)