Defense Evasion
The adversary is trying to avoid being detected in your AI system.
Attack Techniques
Explore the specific techniques adversaries use during the defense evasion phase of AI attacks.
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth
References:
Impair Defenses
Adversaries may modify system configurations to impair defensive capabilities in AI systems.
Examples:
- •Disabling AI security monitoring
- •Manipulating model validation
- •Bypassing detection mechanisms
Mitigations:
- ✓Immutable security controls
- ✓Regular security audits
- ✓Defense in depth