Abstract
Payments critical infrastructure is subject to rapid technological change. Increasingly sophisticated threats must be addressed to ensure the banking and financial system security and integrity. Several high-profile cyber-incidents have recently shaken the global financial community and stimulated renewed efforts to reinforce and bolster its security framework. Two different cross border payments management approaches have emerged over the years: the SWIFT financial messaging standard and the innovative peer-to-peer transaction model based on the blockchain technology. Debates about which one will prevail as the best practice are currently a very popular topic. Security, and more specifically resiliency to evolving cyber threats, will likely be the main point of concern. Both the SWIFT and the blockchain models present potential exposure to such vulnerabilities. Ultimately, the discussion boils down to an assessment of whether a decentralized, distributed system like the blockchain better meets the integrity requirements of a modern payments infrastructure and is more suitable to mitigate the root cause of cyber incidents, which is human error.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Change history
05 September 2020
Reference 26 of this paper has been updated. The authors were unaware that [1] had almost fully plagiarized [2] and wish to give full credit to the original authors.
[1] RETRACTED ARTICLE: Dheeraj, J., Gurhubaran, S.: DDoS mitigation using blockchain. Int. J. Res. Eng. Sci. Manag. 1(10) (2018).
[2] Rodrigues, B., Bocek, T., Lareida, A., Hausheer, D., Rafati, S., Stiller, B.: A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 16–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60774-0_2.
References
SWIFT Website. https://www.swift.com/about-us/history. Accessed 09 Sept 2019
Huurdeman, A.A.: The Worldwide History of Telecommunications. Wiley-Interscience Publications, Hoboken (2003)
Köppel, J.: The SWIFT Affair: Swiss Banking Secrecy and the Fight Against Terrorist Financing, 1st edn. Graduate Institute Publications (2011)
Scott, S.V., Zachariadis, M.: Origins and development of SWIFT, 1973–2009. Bus. Hist. J. 54, 462–482 (2012)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System, 24 February 2013. http://bitcoin.org/bitcoin.pdf
Crosby, M., Pattanyak, P., Verma, S., Kalyanaraman, V.: Blockchain technology: beyond bitcoin. Appl. Innov. Rev. 2 (2016)
Yaga, D., Meel, P., Roby, N., Scarfone, K.: Blockchain Technology Overview. National Institute of Standards and Technology Internal Report 8202 (2018)
Ripple Website. https://ripple.com/ripplenet/process-payments/. Accessed 09 Sept 2019
EEA. https://entethalliance.org/. Accessed 09 Sept 2019
Pandit, V., Dayama, P.: Privacy in blockchain collaboration with zero knowledge proofs. IBM Blockchain Blog (2019)
J.P. Morgan Website. https://www.goquorum.com/. Accessed 09 Sept 2019
Bank Info Security Website. https://www.bankinfosecurity.com/7-iranians-indicted-for-ddos-attacks-against-us-banks-a-8989. Accessed 09 Sept 2019
Nish, A., Naumaan, S.: The Cyber Threat Landscape: Confronting Challenges to the Financial System. In: Cyber Policy Initiative Working Paper Series, pp. 8–9. Carnegie Endowment for International Peace (2019)
Reuters Website. http://uk.reuters.com/article/us-cyber-heist-bangladesh/exclusive-bangladesh-probes-2013-hack-for-links-to-central-bank-heist-idUKKCN0YG2UT. Accessed 09 Sept 2019
Nettitude Website. https://www.nettitude.com/wp-content/uploads/2016/12/Nettitude-SWIFT-Threat-Advisory-Report-client.pdf. Accessed 09 Sept 2019
TrendLabs Security Intelligence Blog. https://blog.trendmicro.com/trendlabs-security-intelligence/high-profiled-cyber-theft-against-banks-targeted-swift-systems/. Accessed 09 Sept 2019
LIFARS Website. https://lifars.com/2016/04/bangladesh-bank-hackers-used-malware-swift-software/. Accessed 09 Sept 2019
Reuters Website. https://www.reuters.com/article/us-bangladesh-bank-idUSKCN0WF0IL. Accessed 09 Sept 2019
Bae Systems Threat Research Blog. https://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html. Accessed 09 Sept 2019
The Himalayan Times Website. https://thehimalayantimes.com/business/kpmg-team-seek-time-draw-conclusion-nic-asia-bank-case/. Accessed 09 Sept 2019
IBM Website, Research Report: IBM Security Services 2014 Cyber Security Intelligence Index, p. 3. https://www.ibm.com/developerworks/library/se-cyberindex2014/index.html. Accessed 09 Sept 2019
SWIFT Website. https://www.swift.com/myswift/customer-security-programme-csp/security-controls. Accessed 09 Sept 2019
SWIFT Website. https://www.swift.com/insights/press-releases/swift-and-accenture-outline-path-to-distributed-ledger-technology-adoption-within-financial-services. Accessed 09 Sept 2019
Financial Times Website. https://www.ft.com/content/966f5694-22c6-11e8-ae48-60d3531b7d11. Accessed 09 Sept 2019
Gartner Website. https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Accessed 09 Sept 2019
Rodrigues, B., Bocek, T., Lareida, A., Hausheer, D., Rafati, S., Stiller, B.: A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 16–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60774-0_2
Liu, Z., Cheng, X.: Application of block chain technology in the field of network security. Int. Core J. Eng. 5(7) (2019)
G-Data Blog. https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017. Accessed 09 Sept 2019
Nasonov, D., Visheratin, A.A., Boukhanovsky, A.: Blockchain-based transaction integrity in distributed big data marketplace. In: Shi, Y., et al. (eds.) Computational Science – ICCS 2018. ICCS 2018. LNCS, vol. 10860. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93698-7_43
Sigwart, M., Borkowski, M., Peise, M., Shulte, S., Tai, S.: Blockchain-based data provenance for the internet of things. arXiv:1905.06852v2 (2019)
Ismail, R.: Enhancement of Online Identity Authentication Though Blockchain Technology (2018). https://doi.org/10.18517/ijaseit.8.4-2.6838
Delgado-Mohatar, O., Tolosana, J.F.R., Vera-Rodriguez, R.: Blockchain and biometrics: a first look into opportunities and challenges. arXiv:1903.05496v1 (2019)
ZDNet Website. https://www.zdnet.com/article/bitcoin-blues-this-is-how-much-cyptocurrency-was-stolen-last-year/. Accessed 09 Sept 2019
Deloitte Website, Research Report: Blockchain & Cyber Security. Let’s Discuss, p. 10. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/financial-services/us-blockchain-and-cyber-security-lets-discuss.pdf. Accessed 09 Sept 2019
Baliga, A.: Understanding Blockchain Consensus Models. Persistent Systems Ltd White Paper, pp. 3–8 (2017)
Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19, 53–659 (2017)
Bitcoin Visuals website. https://bitcoinvisuals.com/chain-block-reward. Accessed 09 Sept 2019
Eyal, I., Gun Sirer, E.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)
Luke Dashjr Website. https://luke.dashjr.org/programs/bitcoin/files/charts/software.html. Accessed 09 Sept 2019
O’Dwyer, K.J., Malone, D.: Bitcoin mining and its energy footprint. In: ISSC 2014/CIICT 2014 (2014)
DataLight Website. https://datalight.me/blog/researches/longread/bitcoin-becomes-the-main-method-of-international-payment/. Accessed 09 Sept 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Franchina, L., Carlomagno, G. (2020). A Comparison Between SWIFT and Blockchain from a Cyber Resiliency Perspective. In: Nadjm-Tehrani, S. (eds) Critical Information Infrastructures Security. CRITIS 2019. Lecture Notes in Computer Science(), vol 11777. Springer, Cham. https://doi.org/10.1007/978-3-030-37670-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-37670-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37669-7
Online ISBN: 978-3-030-37670-3
eBook Packages: Computer ScienceComputer Science (R0)