SENTINEL

Open-source DDoS protection that doesn't suck

MIT Licensed • Self-hosted • Built by a student who got tired of $60k/year solutions

The Problem

What's a DDoS attack?

Imagine 10,000 people calling your phone at once. Your phone crashes. That's DDoS - bots flood your website with fake traffic until it goes offline.

The Real Problem: Protection is Expensive

Service Cost What You Get
Cloudflare Pro + Bot Management $220/month Basic protection, limited customization
AWS Shield Advanced $3,000/month Enterprise features, AWS-only
Imperva ~$5,000/month Full suite, vendor lock-in
SENTINEL $0 Full control, runs anywhere

Small businesses, nonprofits, and indie developers can't afford this. So they go unprotected.

How SENTINEL Works

Think of it like airport security with multiple checkpoints. Every visitor goes through layers of inspection:

The Inspection Process

If you pass all checks: you're in. If you fail: you get a challenge (like a CAPTCHA) or get blocked.

The key: All the heavy analysis happens in the background, so your website stays fast (<1ms delay).

What Makes It Different

1. It Learns From Your Traffic

Most systems use fixed rules ("block if >100 requests/min"). SENTINEL watches your actual visitors and learns what "normal" looks like for YOUR site. A news site during breaking news looks different than a blog.

2. It Doesn't Slow You Down

The AI analysis happens in background threads while your website keeps serving pages. Think of it like a security guard reviewing camera footage AFTER you've already walked through the door.

3. It Catches Coordinated Attacks

Modern botnets use thousands of different IP addresses. SENTINEL groups them by behavior: "These 500 IPs all visit the same pages, at the same speed, in the same order. They're working together."

4. It Shares Intelligence

If you run multiple servers, they talk to each other. When Server A blocks an attacker, Server B knows about it instantly. No central database needed.

Does It Actually Work?

I tested SENTINEL against the CIC-DDoS2019 dataset - real attack traffic captured from actual DDoS attacks in 2019.

96.0%
Caught 96% of bot attacks
3.6%
Only blocked 3.6% of real humans (false positives)
<1ms
Added delay to each request (imperceptible)
159
Automated tests (all passing)

What This Means

Out of 100 bot attacks, SENTINEL stops 96. Out of 100 real humans, it accidentally blocks 3-4 (who can solve a challenge to get through).

Most commercial solutions don't publish their false positive rates. The ones that do aim for similar numbers, but charge thousands per month.

For The Technical Folks

The Neural Network

A simple 3-layer neural network that learns to recognize bot patterns:

The Contagion Graph

Uses LSH (Locality-Sensitive Hashing) to group similar IPs:

The P2P Network

Servers share threat intelligence via WebSocket gossip protocol:

Why I Built This

I got tired of seeing small websites get taken down by DDoS attacks because they couldn't afford enterprise protection.

Security shouldn't be a luxury. If you can afford a $5/month VPS, you should be able to defend it.

SENTINEL is MIT licensed. Use it, fork it, modify it, deploy it anywhere. No strings attached.

If this helps even one nonprofit stay online during an attack, it was worth the 6 months I spent building it.

→ github.com/matthewvaishnav/sentinel
1 / 7