Train Proxy via Replication (a3660a2d-f6e5-4f1b-9618-332cceb389c8)
Adversaries may replicate a private model. By repeatedly querying the victim's ML Model Inference API Access, the adversary can collect the target model's inferences into a dataset. The inferences are used as labels for training a separate model offline that will mimic the behavior and performance of the target model.
A replicated model that closely mimic's the target model is a valuable resource in staging the attack. The adversary can use the replicated model to Craft Adversarial Data for various purposes (e.g. Evade ML Model, Spamming ML System with Chaff Data).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Train Proxy via Replication (a3660a2d-f6e5-4f1b-9618-332cceb389c8) | MITRE ATLAS Attack Pattern | Create Proxy ML Model (c2bd321e-e196-4954-a8e9-c22f1793acc7) | MITRE ATLAS Attack Pattern | 1 |