Skip to main content

A Comparison Between SWIFT and Blockchain from a Cyber Resiliency Perspective

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11777))

  • The original version of this chapter was revised: One of the references in the original paper referred to a paper that has since been retracted due to plagiarism. The correction to this chapter is available at https://doi.org/10.1007/978-3-030-37670-3_19

Abstract

Payments critical infrastructure is subject to rapid technological change. Increasingly sophisticated threats must be addressed to ensure the banking and financial system security and integrity. Several high-profile cyber-incidents have recently shaken the global financial community and stimulated renewed efforts to reinforce and bolster its security framework. Two different cross border payments management approaches have emerged over the years: the SWIFT financial messaging standard and the innovative peer-to-peer transaction model based on the blockchain technology. Debates about which one will prevail as the best practice are currently a very popular topic. Security, and more specifically resiliency to evolving cyber threats, will likely be the main point of concern. Both the SWIFT and the blockchain models present potential exposure to such vulnerabilities. Ultimately, the discussion boils down to an assessment of whether a decentralized, distributed system like the blockchain better meets the integrity requirements of a modern payments infrastructure and is more suitable to mitigate the root cause of cyber incidents, which is human error.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Change history

  • 05 September 2020

    Reference 26 of this paper has been updated. The authors were unaware that [1] had almost fully plagiarized [2] and wish to give full credit to the original authors.

    [1] RETRACTED ARTICLE: Dheeraj, J., Gurhubaran, S.: DDoS mitigation using blockchain. Int. J. Res. Eng. Sci. Manag. 1(10) (2018).

    [2] Rodrigues, B., Bocek, T., Lareida, A., Hausheer, D., Rafati, S., Stiller, B.: A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 16–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60774-0_2.

References

  1. SWIFT Website. https://www.swift.com/about-us/history. Accessed 09 Sept 2019

  2. Huurdeman, A.A.: The Worldwide History of Telecommunications. Wiley-Interscience Publications, Hoboken (2003)

    Book  Google Scholar 

  3. Köppel, J.: The SWIFT Affair: Swiss Banking Secrecy and the Fight Against Terrorist Financing, 1st edn. Graduate Institute Publications (2011)

    Google Scholar 

  4. Scott, S.V., Zachariadis, M.: Origins and development of SWIFT, 1973–2009. Bus. Hist. J. 54, 462–482 (2012)

    Article  Google Scholar 

  5. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System, 24 February 2013. http://bitcoin.org/bitcoin.pdf

  6. Crosby, M., Pattanyak, P., Verma, S., Kalyanaraman, V.: Blockchain technology: beyond bitcoin. Appl. Innov. Rev. 2 (2016)

    Google Scholar 

  7. Yaga, D., Meel, P., Roby, N., Scarfone, K.: Blockchain Technology Overview. National Institute of Standards and Technology Internal Report 8202 (2018)

    Google Scholar 

  8. Ripple Website. https://ripple.com/ripplenet/process-payments/. Accessed 09 Sept 2019

  9. EEA. https://entethalliance.org/. Accessed 09 Sept 2019

  10. Pandit, V., Dayama, P.: Privacy in blockchain collaboration with zero knowledge proofs. IBM Blockchain Blog (2019)

    Google Scholar 

  11. J.P. Morgan Website. https://www.goquorum.com/. Accessed 09 Sept 2019

  12. Bank Info Security Website. https://www.bankinfosecurity.com/7-iranians-indicted-for-ddos-attacks-against-us-banks-a-8989. Accessed 09 Sept 2019

  13. Nish, A., Naumaan, S.: The Cyber Threat Landscape: Confronting Challenges to the Financial System. In: Cyber Policy Initiative Working Paper Series, pp. 8–9. Carnegie Endowment for International Peace (2019)

    Google Scholar 

  14. Reuters Website. http://uk.reuters.com/article/us-cyber-heist-bangladesh/exclusive-bangladesh-probes-2013-hack-for-links-to-central-bank-heist-idUKKCN0YG2UT. Accessed 09 Sept 2019

  15. Nettitude Website. https://www.nettitude.com/wp-content/uploads/2016/12/Nettitude-SWIFT-Threat-Advisory-Report-client.pdf. Accessed 09 Sept 2019

  16. TrendLabs Security Intelligence Blog. https://blog.trendmicro.com/trendlabs-security-intelligence/high-profiled-cyber-theft-against-banks-targeted-swift-systems/. Accessed 09 Sept 2019

  17. LIFARS Website. https://lifars.com/2016/04/bangladesh-bank-hackers-used-malware-swift-software/. Accessed 09 Sept 2019

  18. Reuters Website. https://www.reuters.com/article/us-bangladesh-bank-idUSKCN0WF0IL. Accessed 09 Sept 2019

  19. Bae Systems Threat Research Blog. https://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html. Accessed 09 Sept 2019

  20. The Himalayan Times Website. https://thehimalayantimes.com/business/kpmg-team-seek-time-draw-conclusion-nic-asia-bank-case/. Accessed 09 Sept 2019

  21. IBM Website, Research Report: IBM Security Services 2014 Cyber Security Intelligence Index, p. 3. https://www.ibm.com/developerworks/library/se-cyberindex2014/index.html. Accessed 09 Sept 2019

  22. SWIFT Website. https://www.swift.com/myswift/customer-security-programme-csp/security-controls. Accessed 09 Sept 2019

  23. SWIFT Website. https://www.swift.com/insights/press-releases/swift-and-accenture-outline-path-to-distributed-ledger-technology-adoption-within-financial-services. Accessed 09 Sept 2019

  24. Financial Times Website. https://www.ft.com/content/966f5694-22c6-11e8-ae48-60d3531b7d11. Accessed 09 Sept 2019

  25. Gartner Website. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 09 Sept 2019

  26. Rodrigues, B., Bocek, T., Lareida, A., Hausheer, D., Rafati, S., Stiller, B.: A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 16–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60774-0_2

  27. Liu, Z., Cheng, X.: Application of block chain technology in the field of network security. Int. Core J. Eng. 5(7) (2019)

    Google Scholar 

  28. G-Data Blog. https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017. Accessed 09 Sept 2019

  29. Nasonov, D., Visheratin, A.A., Boukhanovsky, A.: Blockchain-based transaction integrity in distributed big data marketplace. In: Shi, Y., et al. (eds.) Computational Science – ICCS 2018. ICCS 2018. LNCS, vol. 10860. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93698-7_43

    Chapter  Google Scholar 

  30. Sigwart, M., Borkowski, M., Peise, M., Shulte, S., Tai, S.: Blockchain-based data provenance for the internet of things. arXiv:1905.06852v2 (2019)

  31. Ismail, R.: Enhancement of Online Identity Authentication Though Blockchain Technology (2018). https://doi.org/10.18517/ijaseit.8.4-2.6838

  32. Delgado-Mohatar, O., Tolosana, J.F.R., Vera-Rodriguez, R.: Blockchain and biometrics: a first look into opportunities and challenges. arXiv:1903.05496v1 (2019)

  33. ZDNet Website. https://www.zdnet.com/article/bitcoin-blues-this-is-how-much-cyptocurrency-was-stolen-last-year/. Accessed 09 Sept 2019

  34. Deloitte Website, Research Report: Blockchain & Cyber Security. Let’s Discuss, p. 10. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/financial-services/us-blockchain-and-cyber-security-lets-discuss.pdf. Accessed 09 Sept 2019

  35. Baliga, A.: Understanding Blockchain Consensus Models. Persistent Systems Ltd White Paper, pp. 3–8 (2017)

    Google Scholar 

  36. Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19, 53–659 (2017)

    Google Scholar 

  37. Bitcoin Visuals website. https://bitcoinvisuals.com/chain-block-reward. Accessed 09 Sept 2019

  38. Eyal, I., Gun Sirer, E.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)

    Article  Google Scholar 

  39. Luke Dashjr Website. https://luke.dashjr.org/programs/bitcoin/files/charts/software.html. Accessed 09 Sept 2019

  40. O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: ISSC 2014/CIICT 2014 (2014)

    Google Scholar 

  41. DataLight Website. https://datalight.me/blog/researches/longread/bitcoin-becomes-the-main-method-of-international-payment/. Accessed 09 Sept 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guido Carlomagno .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Franchina, L., Carlomagno, G. (2020). A Comparison Between SWIFT and Blockchain from a Cyber Resiliency Perspective. In: Nadjm-Tehrani, S. (eds) Critical Information Infrastructures Security. CRITIS 2019. Lecture Notes in Computer Science(), vol 11777. Springer, Cham. https://doi.org/10.1007/978-3-030-37670-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37670-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37669-7

  • Online ISBN: 978-3-030-37670-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics