A Holistic Framework for Detecting and Mitigating Fileless Malware in Operational Technology Environments

Authors

  • Faheem Hussain Dawood University of Engineering and Technology, Pakistan Author
  • Syed Farman Hussain Dawood University of Engineering and Technology, Pakistan Author
  • Usman Ahmed Dawood University of Engineering and Technology, Pakistan Author
  • Farayha Hydari Dawood University of Engineering and Technology, Pakistan Author

DOI:

https://doi.org/10.61503/Ijmcp.v2i1.192

Keywords:

Fileless Malware Operational Technology (OT), Security Memory Forensics, Behavioral Analytics, Endpoint Detection and Response (EDR)

Abstract

Fileless malware exists as a highly intricate and dominant security threat that shows increasing presence most strongly in Operational Technology environments. These malicious intrusions work in system memory space exclusively so they do not produce disk-based artifacts that signature-based detection methods would recognize. This document explores the essential challenge of discovering and reducing fileless malware within essential Operational Technology infrastructure that powers vital systems such as power networks and water treatment plants and industrial production facilities. Modern detection methods should focus on memory forensics along with behavioural analytics and endpoint detection response (EDR) and network traffic analysis since file-based artifacts cannot be relied upon. A new framework specifically created for operating technology environments integrates advanced detection methods which target the needs of limited resources alongside real-time operational integrity in legacy systems. The framework uses machine learning algorithms and threat intelligence integration along with anomaly detection capabilities to identify indicators of compromise (IOCs) in advance. The solution includes multiple strong protection measures which include application authorisation together with zero trust architecture and document macro restriction methods for securing users against attacks

Downloads

Published

2025-07-17

How to Cite

A Holistic Framework for Detecting and Mitigating Fileless Malware in Operational Technology Environments. (2025). International Journal of Multidisciplinary Conference Proceedings (IJMCP), 2(1). https://doi.org/10.61503/Ijmcp.v2i1.192