← Back to ATLAS MatrixTactic 12 of 15
Collection
The adversary is trying to gather data of interest from your AI system.
3 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the collection phase of AI attacks.
1
AML.T0035
Data from Information Repositories
Adversaries may collect data from information repositories in AI systems.
Examples:
- •Extracting training data
- •Collecting model configurations
- •Gathering system documentation
Mitigations:
- ✓Data access controls
- ✓Encryption
- ✓Data loss prevention
References:
2
AML.T0036
Data from Information Repositories
Adversaries may collect data from information repositories in AI systems.
Examples:
- •Extracting training data
- •Collecting model configurations
- •Gathering system documentation
Mitigations:
- ✓Data access controls
- ✓Encryption
- ✓Data loss prevention
References:
3
AML.T0037
Data from Information Repositories
Adversaries may collect data from information repositories in AI systems.
Examples:
- •Extracting training data
- •Collecting model configurations
- •Gathering system documentation
Mitigations:
- ✓Data access controls
- ✓Encryption
- ✓Data loss prevention