Cyber Threat Intelligence (CTI) is essential for proactive cybersecurity, enabling organizations to detect,
analyze, and mitigate threats before they cause harm. This paper reviews CTI with a focus on Automated Threat
Intelligence Platforms, Dark Web Monitoring, and Threat Hunting, synthesizing insights from over 40 research papers
and industry reports. Automated platforms leverage AI and ML for real-time threat analysis, while dark web
monitoring uncovers cybercriminal activities and emerging threats. Threat hunting enhances security by proactively
identifying adversaries within networks. Despite advancements, challenges such as false positives, data overload, and
ethical concerns remain. The study highlights the integration of automation, intelligence-driven monitoring, and
human-led threat hunting as a key strategy for strengthening cyber defenses and explores emerging trends, including
AI-powered predictive intelligence and collaborative intelligence sharing, to enhance cybersecurity resilience.
[1] Koloveas, P., Chantzios, T., Tryfonopoulos, C., & Skiadopoulos, S. (2021). "A Crawler Architecture for
Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence". arXiv preprint
arXiv:2109.06932. citeturn0academia5
[2] Nunes, E., Diab, A., Gunn, A., Marin, E., Mishra, V., Paliath, V., Robertson, J., Shakarian, J., Thart, A., &
Shakarian, P. (2016). "Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence". arXiv
preprint arXiv:1607.08583. citeturn0academia6
[3] Cybersixgill. (n.d.). "Real-Time Cyber Threat Intelligence Dark Web". Retrieved from citeturn0search0
[4] CrowdStrike. (n.d.). "Threat Intelligence & Hunting". Retrieved from citeturn0search1
[5] SOCRadar. (n.d.). "Tracking Cybercriminals on the Dark Web: The Role of AI-Powered Threat Intelligence".
Retrieved from citeturn0search2
[6] ZeroFox. (n.d.). "Dark Web Threat Intelligence". Retrieved from citeturn0search3
[7] SOCRadar. (n.d.). "Advanced Dark Web Monitoring". Retrieved from citeturn0search4
[8] Owenson, G. (2025). "What I learnt... about the dark web". "The Times". Retrieved from citeturn0news10
[9] Demirkapi, B. (2025). "Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All".
"Wired". Retrieved from citeturn0news13
[10] Strider Technologies. (2025). "Cyber Intelligence Company Strider Raises $55 Million in Funding". "The Wall
Street Journal". Retrieved from citeturn0news16
[11] Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). "Intelligence-Driven Computer Network Defense
Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains". "Leading Issues in Information
Warfare & Security Research", 1, 80.
[12] Mavroeidis, V., & Bromander, S. (2017). "Cyber Threat Intelligence Model: An Evaluation of Taxonomies,
Sharing Standards, and Ontologies within Cyber Threat Intelligence". "2017 European Intelligence and Security
Informatics Conference (EISIC)", 91-98.
[13] Barnum, S. (2014). "Standardizing Cyber Threat Intelligence Information with the Structured Threat
Information Expression (STIX)". "MITRE Corporation", 11.
[14] Skopik, F., Settanni, G., & Fiedler, R. (2016). "A Problem Shared is a Problem Halved: A Survey on the
Dimensions of Collective Cyber Defense through Security Information Sharing". Computers & Security, 60, 154
176.
[15] Kumar, R., & Tripathi, R. (2019). "A Survey on Security Threats in Cloud Computing Using the CIA Triad".
International Journal of Computer Applications", 975, 8887.
[16] Zhang, Y., Porras, P., & Ullrich, J. (2008). "Highly Predictive Blacklisting". USENIX Security Symposium,
107-122.
[17] Dandurand, L., & Serrano, O. S. (2013). "Towards Improved Cyber Threat Intelligence Sharing". 2013 5th
International Conference on Cyber Conflict (CYCON), 1-16.
[18] Bringer, J. R., & Chelmecki, C. (2015). "A Survey of Cyber Intelligence Sharing Platforms". Proceedings of the
2015 ACM Workshop on Information Sharing & Collaborative Security", 1-8.
[19] Kost, C., & Short, M. (2013). "Automated Threat Intelligence: The Key to Proactive Cyber Defense". "SANS
Institute
[20] Shackleford, D. (2015). "Threat Intelligence: Collecting, Analyzing, Evaluating". SANS Institute.
[21] Husák, M., Čegan, J., & Komárková, J. (2018). "Survey of Attack Attribution in Computer Networks". 2018 41st
International Conference on Telecommunications and Signal Processing (TSP), 1-5.
[22] Kumar, S., & Kumar, R. (2016). "A Review on Threat Intelligence", International Journal of Computer
Applications", 975, 8887.
[23] Kumar, R., & Tripathi, R. (2019). "A Survey on Security Threats in Cloud Computing Using the CIA Triad".
International Journal of Computer Applications", 975, 8887.
[24] Zhang, Y., Porras, P., & Ullrich, J. (2008). "Highly Predictive Blacklisting". USENIX Security Symposium,
107-122.
[25] Dandurand, L., & Serrano, O. S. (2013). "Towards Improved Cyber Threat Intelligence Sharing". 2013