← Back to ATLAS MatrixTactic 13 of 15
Command and Control
The adversary is trying to communicate with compromised AI systems.
1 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the command and control phase of AI attacks.
1
AML.T0072
Application Layer Protocol
Adversaries may use application layer protocols for command and control in AI systems.
Examples:
- •Using AI APIs for C2
- •Abusing model inference for communication
- •Leveraging AI services for control
Mitigations:
- ✓Network monitoring
- ✓API security
- ✓Traffic analysis