Command and Control

The adversary is trying to communicate with compromised AI systems.

1 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the command and control phase of AI attacks.

1
AML.T0072

Application Layer Protocol

Adversaries may use application layer protocols for command and control in AI systems.

Examples:

  • Using AI APIs for C2
  • Abusing model inference for communication
  • Leveraging AI services for control

Mitigations:

  • Network monitoring
  • API security
  • Traffic analysis