LoFP LoFP / legitimate dns queries to llm model hosting platforms by authorized developers, ml engineers, and researchers during model training, fine-tuning, or experimentation. approved ai/ml sandboxes and lab environments where llm model downloads are expected. automated ml pipelines and workflows that interact with llm model hosting services as part of their normal operation. third-party applications and services that access llm model platforms for legitimate purposes.

Techniques

Sample rules

Local LLM Framework DNS Query

Description

Detects DNS queries related to local LLM models on endpoints by monitoring Sysmon DNS query events (Event ID 22) for known LLM model domains and services. Local LLM frameworks like Ollama, LM Studio, and GPT4All make DNS calls to repositories such as huggingface.co and ollama.ai for model downloads, updates, and telemetry. These queries can reveal unauthorized AI tool usage or data exfiltration risks on corporate networks.

Detection logic

`sysmon`
EventCode=22
QueryName IN (
    "*huggingface*",
    "*ollama*",
    "*jan.ai*",
    "*gpt4all*",
    "*nomic*",
    "*koboldai*",
    "*lmstudio*",
    "*modelscope*",
    "*civitai*",
    "*oobabooga*",
    "*replicate*",
    "*anthropic*",
    "*openai*",
    "*openrouter*",
    "*api.openrouter*",
    "*aliyun*",
    "*alibabacloud*",
    "*dashscope.aliyuncs*"
)
NOT Image IN (
    "*\\MsMpEng.exe",
    "C:\\ProgramData\\*",
    "C:\\Windows\\System32\\*",
    "C:\\Windows\\SysWOW64\\*"
)

| stats count
    min(_time) as firstTime
    max(_time) as lastTime
    by src Image process_name QueryName query_count answer answer_count reply_code_id vendor_product

| `security_content_ctime(firstTime)`

| `security_content_ctime(lastTime)`

| `local_llm_framework_dns_query_filter`