A Multivocal Study on Zero-Day Attacks Integrating Best Practices Into a Security Maturity Model

Research output: Contribution to journalReview articlepeer-review

Abstract

Security is an essential attribute of quality software. Detecting and mitigating different types of attacks are essential for producing high-quality software. Organizations spend large amounts of money purchasing intrusion detection systems, antivirus software, and antispyware software. However, these solutions are insufficient, and organizations continue to face security risks due to an ever-growing list of security vulnerabilities. One such security vulnerability is a zero-day attack. A zero-day attack refers to the threat of an unknown security vulnerability in software that either the application developers are unaware of or for which no security patch has been released. Zero-day attacks are complex to analyze due to the lack of data until such attacks are discovered. Despite the significance of zero-day attacks, relatively little empirical research has been conducted to gain a deeper understanding of these attacks. Currently, no model exists to assess the maturity of managing zero-day attacks in an organization. This study aims to develop a zero-day attack maturity model that enables organizations to assess their current capabilities in responding to zero-day attacks and identify areas for improvement, based on defined knowledge areas and maturity levels. A multivocal literature review approach was used to identify best practices for managing zero-day attacks. A zero-day attack maturity model was designed and structured into knowledge areas and maturity levels. Next, case studies were conducted to validate the maturity model. The study outcomes include the maturity model, which outlines best practices for managing zero-day attacks, and the interactive web tool that operationalizes the model. We believe that the study outcomes will increase awareness of such attacks, help assess organizations’ levels of maturity in dealing with zero-day vulnerabilities, and serve as a baseline for further research in this area, supporting industries and developers.

Original languageEnglish
JournalArabian Journal for Science and Engineering
DOIs
StateAccepted/In press - 2025

Bibliographical note

Publisher Copyright:
© King Fahd University of Petroleum & Minerals 2025.

Keywords

  • Best practices
  • Maturity model
  • Software security
  • Zero-day attacks

ASJC Scopus subject areas

  • General

Fingerprint

Dive into the research topics of 'A Multivocal Study on Zero-Day Attacks Integrating Best Practices Into a Security Maturity Model'. Together they form a unique fingerprint.

Cite this