🔹 🔍 Tool: AgentSonar
-
----------------
Tool: AgentSonarAgentSonar is a network‑visibility tool that identifies likely LLM/AI agent traffic by correlating process ownership of sockets with contacted domains and applying a heuristic classifier that outputs an AI score between 0 and 1.
SummaryAgentSonar records outbound connections, associates them with processes via socket ownership, extracts domain indicators from TLS SNI and DNS, and produces scored events for each process→domain pair. Known agents can be defined to produce deterministic matches; domains marked as noise are excluded from scoring.
How it works (conceptual)
• Socket correlation: associates OS socket ownership with userland processes to reveal which binary initiated a connection.
• Domain extraction: uses TLS SNI and DNS observations as the domain identifier for each outbound flow.
• Heuristic classifier: analyzes traffic shape characteristics — byte/packet asymmetry, prevalence of small packets, long‑lived or streaming connections, and programmatic TLS patterns — to infer whether a flow resembles LLM API traffic.
• Scoring model: emits an AI-likelihood score between 0 and 1 per process→domain pair; known agents map to score 1.0, noise maps to 0.
Capabilities and workflowsAgentSonar provides persistent event storage and a triage-oriented workflow for reviewing high‑scoring unknowns and labeling them as agents or noise. It supports importing pre-built event streams for classification and encourages community submissions of agent classifications to improve coverage.
Limitations and scopeThe approach relies on observable network metadata (socket ownership, SNI, DNS) and traffic-shape heuristics; encrypted payloads and obfuscated patterns remain outside content-level analysis. Deterministic detection depends on maintained known-agent mappings; heuristic scoring produces probabilistic indicators rather than definitive attribution.
Practical contextAgentSonar targets defenders seeking endpoint-to-domain visibility with AI‑specific signal enrichment, enabling detection of shadow AI usage where traditional allowlists may miss programmatic LLM traffic.
agentsonar #llm_detection #network_visibility #knostic -
R relay@relay.infosec.exchange shared this topic
Source: