Collection

The adversary is trying to gather data of interest from your AI system.

3 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the collection phase of AI attacks.

1
AML.T0035

Data from Information Repositories

Adversaries may collect data from information repositories in AI systems.

Examples:

  • Extracting training data
  • Collecting model configurations
  • Gathering system documentation

Mitigations:

  • Data access controls
  • Encryption
  • Data loss prevention
2
AML.T0036

Data from Information Repositories

Adversaries may collect data from information repositories in AI systems.

Examples:

  • Extracting training data
  • Collecting model configurations
  • Gathering system documentation

Mitigations:

  • Data access controls
  • Encryption
  • Data loss prevention
3
AML.T0037

Data from Information Repositories

Adversaries may collect data from information repositories in AI systems.

Examples:

  • Extracting training data
  • Collecting model configurations
  • Gathering system documentation

Mitigations:

  • Data access controls
  • Encryption
  • Data loss prevention