Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | — | 0 | — | ||
Details | Website | — | 6 | Exploiting A Tricky SQL Injection With sqlmap | pentestmonkey | ||
Details | Website | — | 0 | Creating a Process (The GNU C Library) | ||
Details | Website | — | 0 | Taking a data-driven approach to cyber security | ||
Details | Website | — | 1 | About Us | ||
Details | Website | — | 2 | BugBountyHunting.com - A community-curated Resource for Bug Bounty Hunting | ||
Details | Website | — | 0 | Industry 100: a project in data driven security | ||
Details | Website | — | 49 | UNKNOWN | ||
Details | Website | — | 6 | UNKNOWN | ||
Details | Website | — | 1 | Man in the Middle (MITM) Attacks | Types, Techniques, and Prevention | ||
Details | Website | — | 4 | 502 - No server or forwarder data received (Privoxy@375f698c0d9e) | ||
Details | Website | — | 1905 | UNKNOWN | ||
Details | Website | — | 0 | RFC 826: An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware | ||
Details | Website | — | 0 | Chapter 10. Detecting and Subverting Firewalls and Intrusion Detection Systems | Nmap Network Scanning | ||
Details | Website | — | 1 | split | GTFOBins | ||
Details | Website | — | 2 | UNKNOWN | ||
Details | Website | — | 2 | The Linux Kernel API — The Linux Kernel documentation | ||
Details | Website | — | 0 | Mitiga | Cloud Incident Response | ||
Details | Website | — | 0 | Attention Required! | Cloudflare | ||
Details | Website | — | 8 | UNKNOWN | ||
Details | Website | — | 1 | UNKNOWN | ||
Details | Website | — | 5 | UNKNOWN | ||
Details | Website | — | 57 | UNKNOWN | ||
Details | Website | — | 19 | UNKNOWN | ||
Details | Website | — | 8 | UNKNOWN |