Techniques
Sample rules
Local LLM Framework DNS Query
- source: splunk
- technicques:
- T1590
Description
Detects DNS queries related to local LLM models on endpoints by monitoring Sysmon DNS query events (Event ID 22) for known LLM model domains and services. Local LLM frameworks like Ollama, LM Studio, and GPT4All make DNS calls to repositories such as huggingface.co and ollama.ai for model downloads, updates, and telemetry. These queries can reveal unauthorized AI tool usage or data exfiltration risks on corporate networks.
Detection logic
`sysmon`
EventCode=22
QueryName IN (
"*huggingface*",
"*ollama*",
"*jan.ai*",
"*gpt4all*",
"*nomic*",
"*koboldai*",
"*lmstudio*",
"*modelscope*",
"*civitai*",
"*oobabooga*",
"*replicate*",
"*anthropic*",
"*openai*",
"*openrouter*",
"*api.openrouter*",
"*aliyun*",
"*alibabacloud*",
"*dashscope.aliyuncs*"
)
NOT Image IN (
"*\\MsMpEng.exe",
"C:\\ProgramData\\*",
"C:\\Windows\\System32\\*",
"C:\\Windows\\SysWOW64\\*"
)
| stats count
min(_time) as firstTime
max(_time) as lastTime
by src Image process_name QueryName query_count answer answer_count reply_code_id vendor_product
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `local_llm_framework_dns_query_filter`