Identification should include a description of how TCP and UDP vulnerabilities are exploited by threat actors.