Evolution and Architecture of Risk Control at 58.com

This article outlines the development stages, architectural evolution, and practical challenges of 58.com’s risk‑control platform, describing how the system progressed from manual review to configurable automation, multi‑scene governance, and intelligent expert‑driven auditing to protect billions of daily transactions.

DataFunSummit
DataFunSummit
DataFunSummit
Evolution and Architecture of Risk Control at 58.com

58.com operates a classified‑information platform that serves both supply‑side (B‑users) and demand‑side (C‑users). The platform constantly faces fraudulent activities such as scams, “wool‑party” abuse, fake orders, invoice fraud, mass posting, and advertising spam.

Why 58.com Started Risk Control

The platform’s rapid growth generated massive non‑normal traffic, prompting the need for a dedicated risk‑control system to safeguard billions of daily data points.

Stage 1: Prototype – Small‑scale Business, Closed System

Manual review combined with limited machine screening.

Two parallel paths after online detection: offline detection and human review.

Problems: hard‑coded rules, high development cost, and slow response to black‑market attacks.

Stage 2: Configurable Automation + Manual Review

Introduced feature‑based rules, text and image algorithms, and behavior clustering.

Three core modules: feature development platform, operable policy management, and centralized risk handling.

Problems: duplicated risk systems after the 58‑Ganji merger, rising operational cost, and pressure from competing platforms.

Stage 3: Fusion of Machine and Human Review, Scenario‑Based Governance

Self‑service development for business teams.

One‑stop operation platform providing tools, testing, deployment, and launch capabilities.

Business isolation through micro‑service separation, circuit‑breaker, and downgrade mechanisms.

Achieved millisecond‑level response, support for thousands of business scenarios, and petabyte‑scale offline analysis.

Stage 4: Expert‑Driven, Intelligent Auditing (Future Planning)

Further isolation of databases, human review, and configuration centers.

Shift to algorithm‑centric automation to raise system self‑operation levels.

Q&A Highlights

1. Example of a black‑market attack: High‑traffic real‑estate listings were posted in bulk using automated scripts; detection relied on abnormal posting patterns, captcha challenges, and behavior‑sequence analysis.

2. Current risk‑control architecture: A top‑level business layer (58 information, enterprise posts, resumes, etc.) feeds into a unified operation platform offering tools, risk‑processing pipelines, data enrichment, clustering, and AI models (text, image).

3. Collaboration with business units: Early friction over false‑positive rates was mitigated by building a middle‑platform that shares responsibility, using data audits and multi‑party feedback to calculate ROI.

In summary, 58.com’s risk‑control capability has evolved through four distinct phases, each addressing emerging fraud tactics and scaling requirements, while emphasizing cross‑functional cooperation and continuous algorithmic improvement.

Thank you for listening.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

fraud detectionplatform architectureinformation securityrisk control
DataFunSummit
Written by

DataFunSummit

Official account of the DataFun community, dedicated to sharing big data and AI industry summit news and speaker talks, with regular downloadable resource packs.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.