Open-source DDoS protection that doesn't suck
MIT Licensed • Self-hosted • Built by a student who got tired of $60k/year solutions
Imagine 10,000 people calling your phone at once. Your phone crashes. That's DDoS - bots flood your website with fake traffic until it goes offline.
| Service | Cost | What You Get |
|---|---|---|
| Cloudflare Pro + Bot Management | $220/month | Basic protection, limited customization |
| AWS Shield Advanced | $3,000/month | Enterprise features, AWS-only |
| Imperva | ~$5,000/month | Full suite, vendor lock-in |
| SENTINEL | $0 | Full control, runs anywhere |
Small businesses, nonprofits, and indie developers can't afford this. So they go unprotected.
Think of it like airport security with multiple checkpoints. Every visitor goes through layers of inspection:
If you pass all checks: you're in. If you fail: you get a challenge (like a CAPTCHA) or get blocked.
The key: All the heavy analysis happens in the background, so your website stays fast (<1ms delay).
Most systems use fixed rules ("block if >100 requests/min"). SENTINEL watches your actual visitors and learns what "normal" looks like for YOUR site. A news site during breaking news looks different than a blog.
The AI analysis happens in background threads while your website keeps serving pages. Think of it like a security guard reviewing camera footage AFTER you've already walked through the door.
Modern botnets use thousands of different IP addresses. SENTINEL groups them by behavior: "These 500 IPs all visit the same pages, at the same speed, in the same order. They're working together."
If you run multiple servers, they talk to each other. When Server A blocks an attacker, Server B knows about it instantly. No central database needed.
I tested SENTINEL against the CIC-DDoS2019 dataset - real attack traffic captured from actual DDoS attacks in 2019.
Out of 100 bot attacks, SENTINEL stops 96. Out of 100 real humans, it accidentally blocks 3-4 (who can solve a challenge to get through).
Most commercial solutions don't publish their false positive rates. The ones that do aim for similar numbers, but charge thousands per month.
A simple 3-layer neural network that learns to recognize bot patterns:
Uses LSH (Locality-Sensitive Hashing) to group similar IPs:
Servers share threat intelligence via WebSocket gossip protocol:
I got tired of seeing small websites get taken down by DDoS attacks because they couldn't afford enterprise protection.
Security shouldn't be a luxury. If you can afford a $5/month VPS, you should be able to defend it.
SENTINEL is MIT licensed. Use it, fork it, modify it, deploy it anywhere. No strings attached.
If this helps even one nonprofit stay online during an attack, it was worth the 6 months I spent building it.