heroui logo

Local LLM Framework DNS Query

Splunk Security Content

View Source
Summary
The 'Local LLM Framework DNS Query' detection rule identifies potential misuse of local LLM (Large Language Model) frameworks on endpoints by monitoring DNS query events logged by Sysmon (Event ID 22). This rule is particularly focused on querying domains associated with LLM models, such as huggingface.co and ollama.ai, which are commonly accessed for downloading models, updates, or telemetry. The significance of these DNS queries lies in their ability to uncover unauthorized AI tool usage and potential data exfiltration risks within corporate environments. The rule provides a structured search syntax for detecting suspicious DNS queries targeting specific model repositories while excluding benign queries from authorized applications or approved sources.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1590
Created: 2025-11-12