#2103: AI Firewalls: Spotting Bombs on an Encrypted Conveyor Belt

With 95% of web traffic encrypted, firewalls can't read packets. Here's how AI analyzes metadata to detect threats without decryption.

0:000:00
Episode Details
Episode ID
MWP-2259
Published
Duration
25:29
Audio
Direct link
Pipeline
V5
TTS Engine
chatterbox-regular
Script Writing Agent
Gemini 3 Flash

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

The Challenge of Encrypted Traffic
Imagine a security guard standing before a conveyor belt moving 100,000 locked boxes per second. The guard can’t open them—yet must instantly decide which are presents and which are bombs. This is the reality of modern network security. With over 95% of web traffic encrypted, traditional firewalls that rely on reading packet contents are obsolete. The payload is a scrambled mess of high-entropy noise, invisible to inspection.

How AI Transforms Detection
Instead of trying to crack encryption, AI models analyze the metadata patterns of encrypted traffic. This is known as Encrypted Traffic Analytics (ETA). The AI looks at three key indicators without ever decrypting a single byte:

  1. Sequence of Packet Lengths and Times (SPLT): Every application has a unique "gait." Video streaming creates heavy, rhythmic bursts of data, while malware exfiltrating data might send tiny, consistent packets every thirty seconds. This quiet, steady rhythm stands out against the chaotic nature of human browsing.

  2. TLS Handshake Fingerprinting: Before encryption begins, the client and server exchange a "ClientHello" packet. This unencrypted packet reveals the cipher suites and libraries used. Modern browsers have specific fingerprints, while malware often uses older, clunkier libraries. An AI can spot a mismatch—for example, a device claiming to be a Mac but using a Linux bot’s handshake.

  3. Initial Data Packet (IDP) Clues: Even in encrypted flows, the first packet often contains unencrypted hints about the protocol. Combined with the other two factors, AI models can identify applications and threats with high accuracy. For instance, Cisco Talos reported 94% accuracy in detecting malicious "beaconing" just by analyzing these metadata patterns.

From Deep Packet to Deep Session Inspection
A major concern with AI detection is false positives. If an AI misidentifies a Zoom call as an attack, it could disrupt business. To mitigate this, the industry is shifting from Deep Packet Inspection to Deep Session Inspection. Instead of judging individual packets, the AI analyzes the entire conversation, building a behavioral baseline of what "normal" looks like for a specific network. A single weird packet might get a yellow light, but a sequence of anomalies triggers a red light.

This approach is also more private. Older methods used "Man-in-the-Middle" decryption, where companies broke encryption to read traffic—a slow process that exposed sensitive data like bank passwords. AI-driven inspection keeps the envelope sealed, weighing it and checking the postmark without opening it.

Real-World Application and IoT
For IoT devices like smart fridges, "normal" behavior is very specific: they talk to one or two manufacturer domains, send small data amounts, and use specific ports. If a compromised fridge suddenly tries to send 500MB to an unknown IP via a database port, the AI flags it instantly. The firewall isn't just a binary on/off switch; it’s a behavioral psychologist for data, moving from a "list of bad things" to a "model of good behavior." This is crucial for detecting zero-day attacks, which might be patient and innocuous but still violate the established baseline of normal network behavior.

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

#2103: AI Firewalls: Spotting Bombs on an Encrypted Conveyor Belt

Corn
Imagine your firewall is a security guard standing in front of a massive, high-speed conveyor belt. On this belt are one hundred thousand opaque, locked black boxes passing by every single second. The guard can’t open the boxes—that would be illegal and take way too much time—but he has to decide, instantly, which boxes are birthday presents and which ones are timed bombs. That is the reality of modern network security. If you can’t read the data, how do you know what’s safe?
Herman
It is a massive challenge, Corn. We are living in an era where over ninety-five percent of all web traffic is encrypted. The old days of a firewall simply reading the "To" and "From" address and maybe peaking inside the envelope to see if there is a virus signature are effectively over. But thanks to AI and some really clever physics-based analysis, we’re actually getting better at spotting the bad guys even when they are wearing a digital invisibility cloak.
Corn
Well, before we dive into how we spot those invisible bad guys, I should mention that today’s episode is powered by Google Gemini three Flash. It’s writing our script today, which is fitting since we’re talking about the intersection of high-speed data and machine intelligence. And speaking of intelligence, our friend Daniel sent us a great prompt to get us moving. He wrote: We often hear about deep packet inspection in the context of web application firewalls. Anyone who has played around with network firewall traffic monitors notices that the concept of network monitoring isn't quite the intrusive who on my network is visiting which websites that many may imagine it to be. Rather, it's primarily a way of viewing packet transmission across the network, out of the network, and into it. Although such intrusive networking monitoring technology undoubtedly exists, mainstream networking monitoring is done at the data type and packet level. With the addition of AI packet inspection, how does this provide a good enough picture of network traffic in order to distinguish between innocuous traffic and traffic that might be talking home or shouldn't be making it past the firewall? In other words, how can we go from looking at the transmission of packets between IP addresses to actually determining if our firewall is working?
Herman
Daniel is hitting on the fundamental shift in the industry, Herman Poppleberry here, by the way. There is this huge misconception that network monitoring is about a guy in a basement reading your Slack messages. In reality, modern security is much more like being a traffic engineer. You aren't looking at who's in the car; you're looking at the make, the model, the speed, and whether that car is behaving like a commuter or a getaway vehicle.
Corn
Right, because if I’m a hacker, I’m not sending a file named "totally_stolen_passwords.txt" in plain text anymore. I’m wrapping it in triple-layered encryption so it looks like every other bit of noise on the wire. So, if the firewall can’t see the "what," it has to focus on the "how." But Herman, help me out here—before we get to the AI magic, what exactly is a "packet" in this context? If I’m looking at a monitor, what am I actually seeing?
Herman
Think of a packet as a single shipping container. It has a header, which is like the shipping label—it has the source IP, the destination IP, the port number, and the protocol, like TCP or UDP. Then it has the payload, which is the actual data. In the past, Deep Packet Inspection, or DPI, would try to crack open that payload and look for "signatures"—specific strings of code that match known malware. But with TLS one point three and modern encryption, that payload is just a scrambled mess of high-entropy noise. It looks like static.
Corn
So if the payload is static, the traditional firewall is basically just a glorified hall monitor checking IDs at the door?
Herman
Well, not exactly, I shouldn't say that word! It's more like a hall monitor who can only see the back of people's heads. You know someone is there, you know where they're going, but you don't know if they're carrying a weapon or a textbook. This is where the "blindness" Daniel mentioned comes in. If eighty-seven percent of threats are now inside encrypted channels, a traditional firewall is essentially guessing.
Corn
So how does AI change the guessing game into an actual science? If I’m an AI model looking at a stream of encrypted packets, what am I actually "training" on? I assume it’s not just looking for the word "danger."
Herman
It’s looking at the "shape" of the traffic. This is what we call Encrypted Traffic Analytics, or ETA. There are three main things the AI analyzes without ever needing to decrypt a single byte. First is the Sequence of Packet Lengths and Times, or SPLT. Every application has a "gait," a way of walking across the network. If you’re watching a Netflix video, you get a massive burst of packets, then a pause while your device buffers, then another burst. It’s heavy, rhythmic, and predictable.
Corn
And I’m guessing a piece of malware exfiltrating data doesn't look like a "Stranger Things" episode.
Herman
Not at all. A piece of spyware or a keylogger "talking home" to a command-and-control server has a very different rhythm. It might send tiny, consistent bursts of data—maybe ten packets every thirty seconds. It’s trying to be quiet, but to an AI trained on millions of sessions, that "quiet" behavior stands out like a sore thumb because it doesn't match the bursty, chaotic nature of human web browsing.
Corn
That’s fascinating. It’s like a detective noticing that someone is walking in a perfect straight line at exactly three miles per hour in a crowded mall. Nobody walks like that unless they’re a robot or have a very specific, non-human purpose.
Herman
That is a great way to put it. The second thing the AI looks at is the TLS Metadata, specifically the "handshake." Before the encryption tunnel is even established, the client and the server have to agree on how they’re going to talk. They send what’s called a "ClientHello" packet. This packet is unencrypted. It contains a list of cipher suites and extensions the client supports.
Corn
And let me guess—modern browsers like Chrome or Firefox have a very specific "handshake" fingerprint, while a slapdash piece of malware written in a basement uses an older, clunkier library?
Herman
Precisely. Well, I keep using those forbidden agreement words! But yes, malware often uses specific versions of libraries like OpenSSL one point zero point one or custom scripts that offer a very weird set of ciphers that a normal browser would never use. An AI model can see that "ClientHello" and immediately say, "Wait, this claim is that it's a Mac running Safari, but the handshake looks like a Linux bot from two thousand fifteen. Block it."
Corn
So we’re catching them in a lie before they even finish saying hello. I love that. It’s like someone showing up to a black-tie gala in a tuxedo but wearing muddy hiking boots. One of these things is not like the other.
Herman
And the third piece is the Initial Data Packet, or IDP. Even in encrypted flows, the very first packet of data often contains some unencrypted hints about the protocol. Between the rhythm of the packets, the fingerprint of the handshake, and the clues in the IDP, AI models can now identify the application or the threat with incredible accuracy. Cisco Talos actually released a report in late twenty-four showing that their models could detect malicious "beaconing"—that’s malware checking in with its boss—with ninety-four percent accuracy just by looking at these metadata patterns.
Corn
Ninety-four percent is high, but in a network moving billions of packets, that six percent error rate sounds like it could be a nightmare for an IT department. If the AI thinks my Zoom call is a North Korean cyberattack and cuts me off mid-sentence, I’m going to be annoyed. How do they manage the false positives?
Herman
That is the million-dollar question. This is why we are seeing a shift from Deep Packet Inspection to what’s being called Deep Session Inspection, or DSI. Instead of looking at one packet and making a snap judgment, the AI looks at the entire "conversation." It builds a behavioral baseline of what "normal" looks like on your specific network. If your computer suddenly starts talking to a server in a country you never do business with, at three in the morning, using a weird handshake, the "anomaly score" goes through the roof.
Corn
So it’s a cumulative score. One weird packet might get a "yellow light," but ten weird packets in a row triggers the "red light" and shuts the door.
Herman
Right. And what’s really cool is that this approach is actually more private than the old way. In the past, to be "safe," companies would do "Man-in-the-Middle" decryption. They would essentially break the encryption, read the traffic, and re-encrypt it. It was slow, it broke some websites, and it meant the company could technically see your bank password if they wanted to. AI-driven inspection doesn't need to do that. It keeps the envelope sealed but weighs it, smells it, and checks the postmark.
Corn
It’s the difference between a TSA agent opening your suitcase and a drug-sniffing dog barking at it. The dog doesn't know what’s in the bag, it just knows something is wrong based on the "scent" of the molecules in the air.
Herman
I promised no analogies, but that one is actually pretty accurate! The "scent" here is the metadata. And because the cost of AI inference—the actual "thinking" the computer does to analyze these patterns—has plummeted, we can now do this in real-time. In twenty-two, it might have cost a tenth of a cent to analyze a gigabyte of traffic. By twenty-five, that cost dropped to point zero zero zero two dollars per gigabyte. That makes it economically viable to run every single packet through a machine learning model.
Corn
That’s a massive drop in cost. I guess that’s why we’re seeing "AI-powered firewalls" being marketed to even small businesses now. But let’s talk about the "talking home" part of Daniel's prompt. If I have a smart fridge or a smart thermostat, those things are "talking home" all the time. How does a firewall distinguish between my fridge asking for a firmware update and my fridge being part of a botnet attacking the Pentagon?
Herman
This is where feature engineering comes in. For an IoT device like a smart fridge, the "normal" behavior is very specific. It talks to one or two specific domains owned by the manufacturer. It sends very small amounts of data. It uses a very specific set of ports. If that fridge suddenly starts trying to send five hundred megabytes of data to an unknown IP address via a port usually used for database queries, the AI knows instantly that the device has been compromised. It’s not about the fact that it's "talking home," it's about the fact that it's talking to a new home in a very aggressive way.
Corn
So the "firewall working" isn't just a binary "is it on or off," but rather "is it successfully identifying the intent of the traffic?" Daniel asked how we go from looking at transmissions to determining if the firewall is working. It sounds like the answer is that the firewall becomes a behavioral psychologist for your data.
Herman
I mean, yes! It’s moving from a "list of bad things" to a "model of good behavior." If you only look for known bad things, you’ll miss the "Zero-Day" attacks—the ones that have never been seen before. But if you know exactly what "good" looks like, the "bad" stands out even if it’s brand new.
Corn
Let’s look at a real-world scenario. You mentioned the SolarWinds attacks. Those were famous because the hackers were incredibly patient. they didn't just smash and grab; they lived inside the networks for months, moving slowly. How would an AI-enhanced firewall catch something that’s trying that hard to be innocuous?
Herman
The twenty-twenty-five follow-up attacks to the SolarWinds style of breach actually tried to use legitimate cloud services like Google Drive and Dropbox as their command-and-control channels. To a human or a basic firewall, that looks like a person just saving a file to the cloud. Totally normal. But the AI models were able to detect it by looking at the "entropy" of the data transfer.
Corn
Entropy? You’re going to have to explain that one for the non-physics majors.
Herman
In information theory, entropy is basically a measure of randomness. Encrypted data has very high entropy—it looks totally random. But different types of files have different "signatures" of entropy even when encrypted. A compressed zip file full of stolen documents has a different entropy profile than a standard HTTPS request for a webpage. By analyzing the "shape" of the data density over a session, AI can flag that a "Dropbox upload" is actually a massive data exfiltration event.
Corn
So even when the hacker is using a "legal" road—like Google Drive—the way they are driving the truck is suspicious. They’re driving a massive semi-truck down a residential street where only minivans usually go.
Herman
Right. And they’re doing it at four in the morning when the "resident" of that computer is supposed to be asleep. This level of granularity is what makes the "AI Firewall" so much more effective than the old-school "Zone-based" firewalls. We used to think of security as a perimeter—a big wall around the castle. But today, the "perimeter" is every single packet.
Corn
It’s "Zero Trust" but at the packet level. I don't care if you're already inside the castle; I’m still going to watch how you walk from the kitchen to the bedroom.
Herman
It sounds paranoid, but in the world of cyber warfare, it’s the only way to survive. And it’s led to a fascinating arms race. Now that hackers know we are using AI to look at their packet "shapes," they are using AI to "mask" those shapes. There are tools now that will take a malicious data stream and "pad" it with extra dummy packets to make it look like a YouTube video or a Spotify stream.
Corn
Wait, so it’s AI versus AI? We have a firewall AI trying to spot the "gait" of a criminal, and a hacker AI trying to make that criminal walk like a grandma going to church?
Herman
Literally. It’s a "Battle of the Algorithms." The hacker's AI is trying to find the "blind spots" in the firewall's training data. If the firewall was trained on a million hours of Netflix traffic, the hacker will try to make their malware look exactly like the "average" Netflix stream. This is why continuous learning is so important. A firewall can't just be a static piece of software you install and forget; it has to be a living system that is constantly updating its models based on the latest global threat intelligence.
Corn
This makes me think about the "First Packet Advantage" you mentioned in the notes Daniel sent over. Some of these engines, like Enea Qosmos, claim they can identify the threat from the very first packet. How is that even possible? That feels like predicting the plot of a movie from the first frame of the studio logo.
Herman
It’s about the extreme specificity of those "ClientHello" handshakes we talked about. There are thousands of tiny variations in how a piece of software initiates a connection. browsers, operating systems, and even specific versions of apps all have these microscopic "tells." If the first packet has a very specific combination of cipher suites that is only ever seen in a known strain of ransomware, you don't need to see the second packet. You drop the connection immediately. You’ve won the fight before the handshake is even finished.
Corn
That is an incredible tactical advantage. It’s like a bouncer who recognizes a fake ID before the person even pulls it out of their wallet just by the way they’re holding their hand.
Herman
And it saves a massive amount of computational power. If you can block a threat on the first packet, you don't have to waste resources analyzing the next ten thousand packets of that session. For a high-traffic enterprise network, that efficiency means the difference between a firewall that stays cool and a firewall that melts down under the load.
Corn
So, to circle back to Daniel's core question: how do we know if our firewall is working? It sounds like we shouldn't be looking for a log that says "Blocked one hundred viruses." We should be looking for a dashboard that shows the "health" of our network's behavioral patterns. If the "anomaly score" across the whole network is low, and the "unidentified traffic" percentage is near zero, that’s how we know the AI is doing its job.
Herman
Precisely. Well, I did it again! But yes, the metric for success has changed. It used to be "Total Blocks." Now, the metric is "Visibility." If your firewall can tell you exactly what every single encrypted flow is—this is Zoom, this is a Windows Update, this is a smart lightbulb—it means nothing is hiding in the shadows. The moment something appears that the AI can't categorize or that behaves "weirdly," that’s your red flag.
Corn
It’s about illuminating the dark corners of the network. If the light is bright enough, the cockroaches have nowhere to hide. But let's get practical for a second. If I'm an IT manager or just a tech-savvy person listening to this, how do I actually use this information? I can't just go out and "buy an AI." Or can I?
Herman
You actually can. Most modern enterprise firewalls—the ones from Cisco, Palo Alto Networks, Fortinet—now have these ETA and AI-inspection features built-in. But if you’re a smaller shop or a hobbyist, you can look at open-source tools. There are systems like Zeek or Suricata that have machine learning plugins. You can actually feed your network traffic into these tools in a lab environment and see the behavioral analysis for yourself.
Corn
And what should people be looking for when they evaluate these "AI Firewalls"? Because I’m sure every salesperson on earth is slapping the "AI" label on their product right now, even if it’s just a basic set of rules.
Herman
That is a very important point. The "BS meter" needs to be high here. If a vendor says they have an AI firewall, ask them two specific questions. First: "What specific features are you using for your models? Are you looking at SPLT, TLS fingerprinting, or just basic IP reputation?" If they can't explain the metadata they are analyzing, it's probably not real AI.
Corn
And the second question?
Herman
"What is your false-positive rate on encrypted traffic?" In the industry, anything above a two percent false-positive rate is going to stay in "monitor-only" mode forever because no admin wants to be the guy who accidentally blocked the CEO’s daughter’s birthday video. A real, high-quality AI-driven system should be able to get that rate way down, because it’s looking at the "session intent," not just a single suspicious packet.
Corn
That is a great tip. "Intent" over "Content." It’s a complete paradigm shift. It also makes me wonder about the "Privacy Paradox" you mentioned. If the AI is so good at spotting behavior, could it eventually get so good that it "de-anonymizes" people? Like, if I’m using a VPN or Tor to stay private, can the AI "see" through that by looking at my "gait"?
Herman
That is actually a huge area of research right now. There have been studies showing that you can identify a Tor user's activity—like whether they are watching a video or just reading text—with over eighty percent accuracy just by looking at the packet timing and size, even though the data is triple-encrypted. So, there is a flip side to this. The same technology that keeps us safe from hackers can also be used by repressive regimes to monitor their citizens without ever needing to "break" the encryption.
Corn
Man, there is always a catch, isn't there? We build a better shield, and someone finds a way to use it as a spotlight. It really reinforces the idea that security isn't just a technical problem; it's a policy and ethics problem too.
Herman
It really is. But for most of us, the immediate benefit of AI packet inspection is that it finally gives the "good guys" a way to fight back against the tidal wave of encrypted malware. We spent the last decade becoming "blind" to our own network traffic as encryption became the standard. AI is effectively giving us our sight back.
Corn
It’s high-tech cataract surgery for the internet. I like it. So, if I’m setting this up, you mentioned a thirty-day baseline period. Why thirty days? Why not just turn it on and see what happens?
Herman
Because your network has its own "culture." Maybe your company has a weird legacy accounting software that was written in nineteen ninety-eight and behaves like a virus. It talks to one specific server in a very "clunky" way. If you turn on active blocking on day one, the AI will see that clunky behavior and think, "Aha! Malware!" and shut down your payroll. You need that thirty-day "learning mode" so the AI can learn that "Oh, that weird, limping traffic over there? That’s just the accounting department. That’s normal for them."
Corn
"That’s just the accounting department" is a phrase that explains a lot of things in life, actually.
Herman
It really does! But once that baseline is set, the firewall becomes incredibly sensitive to anything that doesn't fit the "culture." If the accounting software suddenly starts talking to a server in Eastern Europe instead of the one in the basement, the AI doesn't need a signature to know something is wrong. It just knows that "Accounting doesn't act like this."
Corn
This is such a more elegant way of thinking about security than the old "Blacklist" vs "Whitelist" approach. It’s more organic. It’s more... well, intelligent.
Herman
It has to be. The attackers are using automation and AI to launch millions of variations of their attacks every day. If we try to fight that with human-written rules and manual "whitelists," we’ve already lost. We have to fight speed with speed.
Corn
Speaking of speed, we’ve covered a lot of ground here. We went from the "blindness" of traditional DPI to the "rhythm" of packet metadata, and how AI can catch a hacker in the "ClientHello" phase before they even get through the door. I think Daniel's question about how we know the firewall is working is really answered by that "Visibility" shift. If you can see the "why" and the "how" of your traffic, you’re not just monitoring; you’re managing.
Herman
And you’re doing it while preserving privacy. I think that’s the most important takeaway for me. We don't have to choose between a secure network and a private one. By using AI to analyze the "shape" of the data instead of the "substance" of the data, we can have both.
Corn
It’s the closest thing to a "free lunch" we’ve found in cybersecurity so far. Well, except for the massive GPU costs, but as you said, even those are coming down.
Herman
They really are. And I think we’re going to see this move from the "enterprise" level down to the "home" level very soon. Your home router in two or three years will probably have a dedicated "NPU"—a Neural Processing Unit—just to run these behavioral models on your smart home devices.
Corn
I can’t wait for the day my router tells me, "Corn, your toaster is acting suspicious, I’ve put it in time-out."
Herman
That day is closer than you think! But for now, the real-world application is in the corporate perimeter. If you’re a listener who handles network security, my advice is to start playing with these metadata-driven tools. Don't wait for your current firewall to become "blind." Start looking at the shapes now.
Corn
Great advice, Herman. And honestly, this whole conversation has made me realize how much "noise" I usually ignore when I’m looking at my own network logs. I just see a bunch of IP addresses and think, "Well, I hope it’s fine." But now I’m going to be thinking about the "gait" of those packets.
Herman
Once you see the "rhythm" of the network, you can never un-see it. It turns a static list of numbers into a living, breathing ecosystem.
Corn
Well, before we wrap up and I go try to psychoanalyze my own router's traffic patterns, we should definitely give a shout-out to our producer, Hilbert Flumingtop, for keeping all these packets of information organized for us.
Herman
And a big thanks to Modal for providing the GPU credits that power the generation of this show. We literally couldn't do this without that serverless horsepower.
Corn
If you enjoyed this dive into the "shape" of your data, you might want to check out some of our other episodes. We touched on some foundational stuff back in episode fourteen seventy-six about the "AI Firewall" and the enterprise perimeter. It’s a good companion to what we talked about today if you want to see the "big picture" of how companies are deploying this stuff.
Herman
This has been My Weird Prompts. It’s always a blast to take these technical deep dives with you, Corn.
Corn
Same here, Herman. If you guys are finding this useful, do us a favor and leave a review on whatever app you’re using to listen. It actually helps new people find the show, and it makes us feel like we’re not just shouting into an encrypted void.
Herman
See you next time.
Corn
Later.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.