Risk Control System Architecture and Practices at Meituan
Meituan’s risk‑control architecture transforms diverse, high‑volume e‑commerce services into a middleware‑based platform that unifies data collection, combines expert rules with machine‑learning models, and employs a three‑stage defense—pre‑risk, real‑time detection, and post‑incident response—to continuously adapt to evolving fraud threats.
This article summarizes a talk from the 8th China System Architect Conference, describing Meituan’s risk control system built to combat black‑industry threats across its diverse e‑commerce services.
Background : Meituan’s rapid expansion from group‑buying to a multi‑vertical platform (food delivery, hotel, travel, etc.) created a large attack surface: millions of users, millions of merchants, and high‑frequency transactions, attracting fraud, fake orders, and account theft.
Risk control challenges include:
Numerous business lines and risk points.
Fast‑changing attack techniques.
Uncertainty about when and how attackers will strike.
System‑building experience is organized around three challenges.
Challenge 1: Business Diversity and Many Risk Points
Risk perception requires collecting complete data (who, when, how, what, action). Controlling risk means focusing on attacker incentives (promotions, merchant ranking, user balance). Integration with over 100 business scenarios and multiple client types (iOS, Android, H5, PC) demands a low‑overhead interface.
To reduce integration burden, Meituan moved the risk‑control logic from a function call to an independent service accessed via a central user‑center, merchant‑center, or payment‑center, turning risk control into middleware.
Challenge 2: Rapid Change
Static rules quickly become ineffective. A robust strategy combines expert‑crafted rules with machine‑learning models, using a “rule platform” that separates scenario, rule, and factor layers, enabling many‑to‑many relationships and dynamic configuration without code changes.
The platform supports synchronous decision APIs and asynchronous data‑collection APIs, and allows runtime selection of strategies via a rule engine.
Challenge 3: Unknown Attackers
Since attackers only need to find a single weak point, Meituan adopts a three‑stage defense: pre‑risk (education, participation, data preparation, proactive protection), real‑time detection (rule platform, verification center), and post‑incident response (case handling, compensation, feedback loops).
Data is categorized into event snapshots, aggregated facts, derived information, and auxiliary base data to support both operational and analytical needs.
Conclusion : A mature risk‑control system requires tight integration, efficient rule execution, a verification service, and continuous feedback. Learning from adversaries and applying systematic, layered defenses are essential for long‑term success.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Meituan Technology Team
Over 10,000 engineers powering China’s leading lifestyle services e‑commerce platform. Supporting hundreds of millions of consumers, millions of merchants across 2,000+ industries. This is the public channel for the tech teams behind Meituan, Dianping, Meituan Waimai, Meituan Select, and related services.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
