SLIIT Research Project • 25-26J-055

RiskAura

Predictive Cybersecurity Risk Assessment with Dynamic Asset Valuation - an intelligent, automated system that enhances the OCTAVE Allegro framework with machine learning capabilities, real-time data integration, and predictive financial modeling.

0
Research Components
0
Team Members
0
Years of Threat Data
0
ML Models Deployed
πŸ”¬ About The Project

What is RiskAura?

RiskAura is a research-driven solution that transforms traditional OCTAVE Allegro risk assessments into an intelligent, automated platform leveraging machine learning, real-time data integration, and predictive analytics for proactive cyber risk management.

πŸ€–

ML-Powered

Advanced NLP and machine learning for automated threat identification, asset profiling, and risk analysis.

πŸ“Š

Real-Time Analysis

Dynamic asset valuation with live market data integration and continuous risk assessment updates.

πŸ›‘οΈ

OCTAVE Allegro

Enhanced traditional framework with AI automation, transforming manual processes into intelligent workflows.

πŸ’°

Financial Impact

Predictive financial modeling, ROI optimization, and cost-benefit analysis for cybersecurity investments.

🧩 Research Components

Research Contributions

Our system operates through four integrated components working in synergy, each led by a specialized team member.

Jayasekara J.K.C.D

Jayasekara J.K.C.D

IT22589668

ML-Based Asset Profiling & Real-Time Market Valuation - ML regression models for value prediction, and real-time market data integration.

More Details β†’
Mallikage D.S

Mallikage D.S

IT22567260

Intelligent Risk Identification & Analysis using ML β€” NLP-based threat intelligence, clustering for attack pattern recognition, and automated threat-to-asset mapping.

More Details β†’
E.G.K.P. Perera

E.G.K.P. Perera

IT22561152

Automated Threat Modeling & MITRE ATT&CK Integration β€” Dynamic probability calculation, automated report generation, and adversary behavior prediction models.

More Details β†’
H.A.D.D. Thathsarani

H.A.D.D. Thathsarani

IT22578228

Predictive Financial Impact & Risk Forecasting - ML models for loss prediction, ROI calculation, financial impact visualization-.

More Details β†’
πŸ“š Research Domain

Research Domain

Explore the academic foundations, methodology, and technical architecture of our research.

πŸ—οΈ System Architecture

The proposed solution, "Automated OCTAVE Allegro Risk Assessment System (AOARAS)", transforms the traditional manual OCTAVE Allegro methodology into an intelligent, automated platform that leverages machine learning, real-time data integration, and predictive analytics.


The system operates through four integrated components working in synergy:


  1. ML-Based Asset Profiling and Market Valuation β€” Continuously monitors and valuates organizational assets using real-time market data, ML regression models, and automated data scraping. This includes both digital and human assets.
  2. Risk Identification and Analysis Engine β€” Employs NLP and ML to analyze global threat intelligence from multiple sources (2015 – 2025), identifying relevant threats through clustering algorithms and frequency analysis.
  3. Threat Modeling and Analysis Module β€” Integrates with the MITRE ATT&CK framework to automate threat-to-asset mapping, calculate dynamic probability levels, and generate comprehensive risk reports.
  4. Financial Impact and Risk Predictor β€” Utilizes historical incident data and ML models to forecast potential losses, calculate ROI for countermeasures, and provide cost-benefit analysis.

πŸ“– Literature Survey

Organizations worldwide face escalating cybersecurity challenges as digital transformation accelerates and threat landscapes evolve rapidly [1], [2]. Traditional risk assessment methodologies, particularly the OCTAVE Allegro framework while comprehensive and structured suffer from significant limitations including manual processes, static asset valuation, and lack of real-time financial impact analysis [3], [4].


Current OCTAVE Allegro implementations are predominantly manual, time-intensive, and rely heavily on subjective assessments that may not reflect real-time market conditions or dynamic threat environments [3], [4]. Key challenges include manual asset valuation leading to outdated risk calculations, static threat analysis using historical data without considering evolving attack patterns [5], limited financial impact modeling for investment justification, and time-intensive processes creating delays between risk identification and mitigation [6].


Recent advances in automated cybersecurity risk assessment demonstrate significant potential for machine learning and AI to transform traditional approaches. Research shows that ML-based methods can improve cyber risk assessment accuracy by exploiting statistical patterns rather than relying solely on expert estimates [7], [8]. Automated knowledge-based systems have proven effective for complex cyber-physical systems through systematic cause-and-effect modeling [9].


References

  1. N. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and Security: Challenges and Solutions," Applied Sciences, vol. 10, no. 12, p. 4102, 2020. [Replaced for relevance β€” see [2] below for the direct DT & cybersecurity source]
  2. A. BΓ©cue, I. PraΓ§a, and J. Gama, "Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations," Sensors, vol. 23, no. 15, p. 6666, Jul. 2023. doi: 10.3390/s23156666.
  3. R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, "Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process," Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, Tech. Rep. CMU/SEI-2007-TR-012, May 2007. [Online]. Available: https://www.sei.cmu.edu/library/abstracts/reports/07tr012.cfm
  4. C. J. Alberts and A. J. Dorofee, Managing Information Security Risks: The OCTAVE Approach. Boston, MA: Addison-Wesley, 2002.
  5. A. Alahmari and B. Duncan, "Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence," in Proc. 2020 Int. Conf. Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET), 2020, pp. 1–5. doi: 10.1109/CCSET49595.2020.9110347.
  6. S. Shevchenko, A. Bragg, and C. Woody, "Threat Modeling: A Summary of Available Methods," Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, White Paper, Dec. 2018. [Online]. Available: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=524448
  7. D. Apruzzese, M. Colajanni, L. Ferretti, and M. Marchetti, "A Machine Learning-based Method for Cyber Risk Assessment," in Proc. 2023 IEEE Int. Conf. Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 1–6. doi: 10.1109/CSR57506.2023.10178782.
  8. Y. Zhao, Y. Liu, and G. Chen, "Cybersecurity and Risk Prediction Based on Machine Learning," Applied Mathematics and Nonlinear Sciences, vol. 9, no. 1, Sep. 2024. doi: 10.2478/amns-2024-2480.
  9. S. C. Phillips, S. Taylor, M. Boniface, S. Modafferi, and M. Surridge, "Automated Knowledge-Based Cybersecurity Risk Assessment of Cyber-Physical Systems," IEEE Access, vol. 12, pp. 82482–82505, 2024. doi: 10.1109/ACCESS.2024.3404264.

πŸ”Ž Research Gap

The cybersecurity market has evolved with AI-driven threat detection becoming mainstream, yet risk assessment methodologies have not kept pace. Studies indicate that artificial intelligence methods, particularly Machine Learning, Deep Learning, and Reinforcement Learning, have become essential in cybersecurity applications. Automated risk assessment systems show effectiveness in industrial environments using fuzzy analytic hierarchy processes for platform risk evaluation.


This research addresses the critical gap between traditional risk assessment methodologies and modern cybersecurity requirements by developing an intelligent, automated system that enhances the OCTAVE Allegro framework with machine learning capabilities, real-time data integration, and predictive financial modeling.


Existing approaches face issues like: static asset valuation not reflecting real-time market conditions, keyword-based threat analysis missing semantic understanding, lack of dynamic access control integration, and absence of predictive financial impact modeling for cybersecurity investment decisions.

❓ Research Problem

"How can an automated risk assessment system enhance the OCTAVE Allegro framework by integrating real-time asset valuation using machine learning, automated threat analysis through NLP and ML, and predictive financial impact modeling β€” to improve data-driven cybersecurity decision-making, reduce manual effort, and ensure alignment with organizational risk management policies?"

🎯 Research Objectives

Main Objective:

Design and implement an intelligent, automated risk assessment system that enhances the OCTAVE Allegro framework within one year, by integrating real-time asset valuation using machine learning, automated threat analysis through NLP and ML, and predictive financial impact modeling.


Sub-Objectives:

  1. Develop ML-based asset profiling and real-time market valuation system with automated discovery mechanisms and ML regression models for asset value prediction.
  2. Create intelligent risk identification and analysis engines using advanced NLP (BERT, RoBERTa) for semantic understanding of threat reports and clustering algorithms for attack pattern recognition.
  3. Develop automated threat modeling with MITRE ATT&CK integration, dynamic probability calculation algorithms, and adversary behavior prediction models.
  4. Build a predictive financial impact and risk forecasting framework with ML-driven loss prediction, ROI calculation engines, and optimization algorithms for resource allocation.

βš™οΈ Methodology

This study employs a mixed-methods design science approach:


  1. Asset Profiling Module: Automated asset discovery with ML regression models for predicting asset value, real-time market data APIs, and human asset valuation using HR and incident data.
  2. Risk Identification Engine: NLP-based threat intelligence analysis using transformer models (BERT, RoBERTa), clustering algorithms for attack pattern recognition, and industry-specific threat prioritization.
  3. Threat Modeling Module: MITRE ATT&CK framework integration, dynamic probability calculation using adaptive algorithms, automated report generation with specific mitigation recommendations.
  4. Financial Impact Module: Historical incident data analysis, ML models for loss prediction, ROI calculation for mitigation strategies, cost-benefit analysis, and risk forecasting for upcoming year.

Performance validation through experiments measuring accuracy, security, and operational efficiency. Data sourced from global datasets (CVE, NVD, Ponemon Institute, Kaspersky, IBM X-Force) spanning 2015–2025.

πŸ› οΈ Technologies Used

Our system integrates cutting-edge technologies across multiple domains:


🐍 Python 🧠 TensorFlow πŸ“Š scikit-learn πŸ€— HuggingFace Transformers πŸ“ BERT / RoBERTa 🎯 MITRE ATT&CK πŸ”’ NIST Framework πŸ“‹ ISO 27001 πŸ“ˆ COBIT 2019 🌐 Flask / Node.js πŸ“Š Pandas / NumPy πŸ—„οΈ CVE / NVD Databases πŸ“‰ Alpha Vantage API ☁️ Google Colab πŸ”’ Gradient Boosting 🧬 Neural Networks πŸ“Š Matplotlib / Seaborn πŸ—‚οΈ OWASP
πŸ“… Timeline

Project Milestones

Key assessments and deliverables throughout our research journey.

August 2025

Project Proposal

Initial research proposal presentation covering literature review, research gap, problem statement, objectives, and methodology.

December 2025

Progress Presentation 1

50% project completion β€” Initial implementation and research findings presentation including data collection, model development, and preliminary results.

March 2026

Progress Presentation 2

90% project completion β€” Advanced implementation, component integration, performance evaluation, and near-final results demonstration.

May 2026

Final Presentation

Complete research findings, fully integrated system demonstration, thesis submission, and final defense presentation.

June 2026

Final Thesis

Individual oral examination to evaluate each member's understanding and contribution to the research project.

πŸ“„ Research Deliverables

Research Documents

Comprehensive documentation of our research methodology, findings, and deliverables.

πŸ“

Topic Assessment Form

TAF documenting the 4 members around the research topic.

⬇️ Download
πŸ“‘

Proposal Reports

Comprehensive individual research proposal reports with literature review.

⬇️ Download
πŸ“š

Final Thesis (Draft)

Complete documentation of research methodology and findings.

⬇️ Download
βœ…

Checklists

Project milestones and requirements verification documents.

⬇️ Download
πŸ“°

Research Paper

Academic paper submitted for publication.

⬇️ Download
πŸ“Š Presentations

Research Presentations

Slides and presentations from each milestone of our research journey.

Completed

Proposal Presentation

Initial research proposal and project outline presentation covering problem definition and approach.

Completed

Progress Presentation 1

50% completion milestone β€” Initial implementation results and research findings presentation.

Completed

Progress Presentation 2

90% completion update β€” Research progress and component integration demonstration.

Completed

Final Presentation

Final defense β€” Complete research findings and project demonstration.

πŸ‘₯ Our Team

About Us

Meet the researchers behind RiskAura and our academic supervisors.

Jayasekara J.K.C.D

Jayasekara J.K.C.D

IT22589668
ML & Asset Valuation Specialist

Responsible for developing machine learning regression models for asset profiling and real-time market valuation.

Mallikage D.S

Mallikage D.S

IT22567260
NLP & Threat Intelligence Specialist

Focuses on advanced NLP and semantic analysis to process cybersecurity threat intelligence.

E.G.K.P. Perera

E.G.K.P. Perera

IT22561152
Threat Modeling & MITRE ATT&CK Expert

Handles dynamic risk calculation and adversary behavior prediction using the MITRE ATT&CK framework.

H.A.D.D. Thathsarani

H.A.D.D. Thathsarani

IT22578228
Financial Modeling & Risk Forecasting

Conducts predictive financial modeling, ROI calculation, and cost-benefit analysis for cybersecurity economics.

Our Supervisors

Academic guidance and research leadership

Mr. Amila Nuwan Senarathne

Mr.Amila Nuwan Senarathne

Supervisor

Senior Lecturer, Faculty of Computing
Sri Lanka Institute of Information Technology

βœ‰οΈ amila.n@sliit.lk
Mr. Deemantha Siriwardana

Mr.Deemantha Siriwardana

Co-Supervisor

Lecturer, Faculty of Computing
Sri Lanka Institute of Information Technology

βœ‰οΈ deemantha.s@sliit.lk
πŸ’¬ Get In Touch

Contact Us

Have questions about our research or interested in collaboration? Feel free to reach out.

βœ‰οΈ

Email

riskaura.research@gmail.com

πŸ“

Address

Department of Computer Systems Engineering,
Sri Lanka Institute of Information Technology,
Malabe Campus, New Kandy Rd, Malabe 10115, Sri Lanka

πŸ“ž

Phone

+94 (117) 544 801

🌐

University

www.sliit.lk

Send a Message