Self-defending routers · Open-core

Intelligent routing. Autonomous defence. Explainable by design.

Have your routers defend themselves against AI-driven attacks — with AI and a swarm. route.fast gives each router an on-device AI brain and links them into a coordinated swarm: together they detect threats like DDoS and BGP hijacks, reason about them, and reroute in real time — authenticated by LIP-4D and explained in plain language.

swarm.monitor// rt-cluster-01
IDLE quorum rt-a · west rt-b rt-c · south rt-d rt-e

What is route.fast

An agentic router that reasons, acts, and explains itself.

route.fast blends proven Linux routing — FRR, BIRD, GoBGP — with high-speed telemetry from eBPF, NetFlow and Suricata/Zeek, and a local LLM "brain" trained to reason about threats and intent.

It explains every action in plain language, enforces policy through LIP-4D, and coordinates with peers over a secure, human-auditable intent protocol.

// 01
Metadata onlyThe AI reasons over telemetry, never packet payloads. Forwarding stays in kernel/ASIC.
// 02
Standards-based controlFlowSpec, BGP policy, ACLs and VRF/VLAN segmentation — interoperable, no lock-in.
// 03
Bounded & reversibleRate-limits, circuit-breakers and automatic rollback on every action.

How it works

Six steps from signal to defended.

Every mitigation runs the same auditable loop — sense the network, reason about intent, gate it through LIP-4D, act with standard tools, explain the decision, and coordinate with the swarm.

Sense

eBPF, NetFlow/sFlow and Suricata/Zeek deliver high-fidelity signals.

Reason

The LLM weighs evidence against policy and returns a structured action + explanation.

Gate

LIP-4D validates identity, authorization, context and TTL before any change.

Act

FRR/ExaBGP/nftables apply FlowSpec, localpref, ACLs and segmentation.

Explain

Each action is logged with a human-readable rationale and evidence digest.

Coordinate

Peers exchange signed intents to share load and prevent cascading failure.

Core capabilities

Built to be trusted, not just clever.

AI-driven reasoning

An on-device brain that thinks in JSON

A local LLM interprets telemetry and proposes mitigations in strict, schema-validated JSON — each with a clear, reviewable explanation. No payloads leave the box.

Agentic coordination

Routers that negotiate, not collide

Nodes exchange signed intents in an AI-native language, corroborating each other's view and reaching quorum to prevent collateral damage across the network.

LIP-4D security

Every change, authorised

Identity, authorization, context and time checks gate each action before it reaches the control plane.

Read the protocol →
Standards-based actuation

Interoperable by default

FlowSpec, BGP policy, ACLs and VRF/VLAN segmentation — standard control, no proprietary lock-in.

Explainable autonomy

Audit-ready evidence

Every action carries its rationale and an evidence digest to accelerate incident response.

Two editions, one mission

Open innovation meets defence-grade resilience.

Both editions share the same ethical AI framework, explainable actions, and continuous collaboration between human and machine reasoning.

Community Edition · Apache-2.0

For ISPs, labs & ethical hackers

Open-source core router with explainable AI and the LIP-4D intent policy engine. Run it, inspect it, extend it.

  • Core routing engine & Intent4D model
  • LIP-4D protocol semantics & local validation
  • Distributed swarm: signed peers, quorum & dashboard
  • Public JSON Schemas & RFCs
Enterprise / Defence Edition

For sovereign, mission-critical networks

Commercial and sovereign version with advanced threat intelligence, compliance audit and certified secure control for Defence and national infrastructure.

  • Central LIP-4D server & cross-node coordination
  • Multi-tenant governance & Rules-of-Engagement orchestration
  • Compliance & audit exports
  • Defence / sovereign governance, aligned with UK MOD standards
CapabilityCommunityEnterprise
LicenseApache-2.0Commercial
Core routing engine
Intent4D model & LIP-4D semantics
Local intent validation (Gate)
JSON Schemas & RFCs
Central LIP-4D server
Cross-node coordination
Multi-tenant governance
Rules-of-Engagement orchestration
Compliance & audit exports
Defence / sovereign governance

Roadmap

Shipping in the open.

Two milestones delivered, two ahead. We publish what works rather than promising what doesn't.

🏁 Alpha · Dec 2025 Shipped

Explain-mode router

Senses, reasons and explains — without acting autonomously.

🧠 Beta · May 2026 Shipped

Distributed LIP-4D swarm

Signed peer protocol, corroboration & quorum, live dashboard — released as CE v0.5 ↗ (Apache-2.0).

🌐 Pilots · Jun 2026 Next

Field deployments

The v0.5 swarm running with ISP & enterprise-lab partners.

💫 GA · Sept 2026 Planned

CE 1.0 + EE 1.0

Autonomous mitigation in CE; central LIP-4D server in the Enterprise Edition.

Support the open-core campaign

Fund a safer, explainable Internet.

What's shipped so far — the Community Edition is live today: a distributed swarm of nodes that exchange ed25519-signed intents over LIP-4D, corroborate one another's view of the network, and must reach quorum before any change is authorised — open source under Apache-2.0, with a dashboard you can run yourself in minutes. The hard part is already built and public: the coordination backbone and the intent protocol that make autonomous defence trustworthy in the first place.
→ LIP-4D Policy Engine→ Model specialisation→ ISP & edge pilots→ Open CE development

Technology provenance

Built in Wales. Engineered for trust.

route.fast is developed by AOvidi Ltd (UK) — originators of the LIP-4D intent protocol and pioneers of AI-driven networking.

The Defence-grade pathway builds on three decades of cybersecurity and cloud-infrastructure expertise, including UK nuclear-research collaborations and ethical-AI validation projects.

30+years cyber & cloud expertise
LIP-4Dnative intent protocol
Apache-2.0open Community Edition
UK MODaligned defence pathway

FAQ

The questions engineers ask first.

Does the AI touch packet payloads?

No. route.fast reasons over metadata only. Data-plane forwarding remains in the kernel/ASIC — the AI never sits in the packet path.

Can it disrupt my routing?

Actions use standard interfaces with rate-limits, circuit-breakers and automatic rollback. Nothing reaches the control plane until LIP-4D has validated identity, authorization, context and TTL.

Is it open source?

Yes. The Community Edition is Apache-2.0. The Enterprise Edition adds the central LIP-4D server, multi-tenant control and compliance exports.

What does v0.5 actually deliver today?

The distributed swarm: ed25519-signed LIP-4D over an authenticated peer protocol, corroboration and quorum logic, signed heartbeats, peer-state gossip and a live dashboard. Autonomous LLM mitigation is the funded next step toward CE 1.0.