@article{9, author = {Nan Sun and Jun Zhang and Ming Ding and Weikang Xu and Xiaoxing Mo and Yonghang Tai and Jiaojiao Jiang}, title = {Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives}, abstract = {We present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining.}, year = {2023}, journal = {Institute of Electrical and Electronics Engineers (IEEE)}, month = {2023}, issn = {1553-877X}, url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10117505}, doi = {10.1109/COMST.2023.3273282}, note = {We proposed a classification scheme for organizing and categorizing existing research works on the basis of the purposes of CTI knowledge acquisition, and we highlighted the methodology adopted by the existing studies. In accordance with the proposed classification scheme, we thoroughly review and discuss current works, including cybersecurity related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting. Furthermore, we discussed current challenges and promising future research directions. Over the past several decades, there has been tremendous interest in CTI mining, specifically for proactive cybersecurity defense. Many people have come to the attention that an enormous number of new techniques and models are developed every year.}, }