Model Extraction

medium

ai-model-extraction

Attacker queries AI model systematically to reconstruct or steal proprietary model weights and architecture

Information Disclosure

MITRE ATT&CK techniques

IDNameTactic
T1530 Data from Cloud Storage Object Collection

Common Weakness Enumeration

Mitigating controls

ctrl-extract-1
Implement strict rate limiting on model API endpoints
ctrl-extract-2
Monitor for systematic querying patterns
ctrl-extract-3
Add output perturbation to prevent exact replication
ctrl-extract-4
Restrict API access with strong authentication

References