01160nas a2200193 4500000000100000008004100001260000900042100001200051700001400063700001400077700001500091700001600106700001700122700001900139245010400158856007000262520062000332022001400952 2023 d c20231 aNan Sun1 aJun Zhang1 aMing Ding1 aWeikang Xu1 aXiaoxing Mo1 aYonghang Tai1 aJiaojiao Jiang00aCyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives uhttps://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=101175053 aWe present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining. a1553-877X