TY - JOUR AU - Nan Sun AU - Jun Zhang AU - Ming Ding AU - Weikang Xu AU - Xiaoxing Mo AU - Yonghang Tai AU - Jiaojiao Jiang AB - We present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining. BT - Institute of Electrical and Electronics Engineers (IEEE) DA - 2023 DO - 10.1109/COMST.2023.3273282 N1 - We proposed a classification scheme for organizing and categorizing existing research works on the basis of the purposes of CTI knowledge acquisition, and we highlighted the methodology adopted by the existing studies. In accordance with the proposed classification scheme, we thoroughly review and discuss current works, including cybersecurity related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting. Furthermore, we discussed current challenges and promising future research directions. Over the past several decades, there has been tremendous interest in CTI mining, specifically for proactive cybersecurity defense. Many people have come to the attention that an enormous number of new techniques and models are developed every year. N2 - We present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining. PY - 2023 T2 - Institute of Electrical and Electronics Engineers (IEEE) TI - Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives UR - https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10117505 SN - 1553-877X ER -