A Holistic Framework for Detecting and Mitigating Fileless Malware in Operational Technology Environments
DOI:
https://doi.org/10.61503/Ijmcp.v2i1.192Keywords:
Fileless Malware Operational Technology (OT), Security Memory Forensics, Behavioral Analytics, Endpoint Detection and Response (EDR)Abstract
Fileless malware exists as a highly intricate and dominant security threat that shows increasing presence most strongly in Operational Technology environments. These malicious intrusions work in system memory space exclusively so they do not produce disk-based artifacts that signature-based detection methods would recognize. This document explores the essential challenge of discovering and reducing fileless malware within essential Operational Technology infrastructure that powers vital systems such as power networks and water treatment plants and industrial production facilities. Modern detection methods should focus on memory forensics along with behavioural analytics and endpoint detection response (EDR) and network traffic analysis since file-based artifacts cannot be relied upon. A new framework specifically created for operating technology environments integrates advanced detection methods which target the needs of limited resources alongside real-time operational integrity in legacy systems. The framework uses machine learning algorithms and threat intelligence integration along with anomaly detection capabilities to identify indicators of compromise (IOCs) in advance. The solution includes multiple strong protection measures which include application authorisation together with zero trust architecture and document macro restriction methods for securing users against attacks