Train Proxy via Replication (a3660a2d-f6e5-4f1b-9618-332cceb389c8)
Adversaries may replicate a private model. By repeatedly querying the victim's AI Model Inference API Access, the adversary can collect the target model's inferences into a dataset. The inferences are used as labels for training a separate model offline that will mimic the behavior and performance of the target model.
A replicated model that closely mimic's the target model is a valuable resource in staging the attack. The adversary can use the replicated model to Craft Adversarial Data for various purposes (e.g. Evade ML Model, Spamming ML System with Chaff Data).
| Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
|---|---|---|---|---|
| Train Proxy via Replication (a3660a2d-f6e5-4f1b-9618-332cceb389c8) | MITRE ATLAS Attack Pattern | Create Proxy ML Model (c2bd321e-e196-4954-a8e9-c22f1793acc7) | MITRE ATLAS Attack Pattern | 1 |