<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2026-12-1-16-25</article-id><article-id custom-type="edn" pub-id-type="custom">YTOMOZ</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-763</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Комплексный подход к обеспечению непрерывности бизнес-процессов на основе централизованных систем резервирования данных</article-title><trans-title-group xml:lang="en"><trans-title>A Comprehensive Approach to Ensuring Business Continuity Based on Centralized Data Backup Systems</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4581-2518</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Соколов</surname><given-names>С. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Sokolov</surname><given-names>S. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, профессор, ректор Государственного университета морского и речного флота им. адмирала С.О. Макарова</p></bio><email xlink:type="simple">sokolovss@gumrf.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7826-9083</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Лаута</surname><given-names>О. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Lauta</surname><given-names>O. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, доцент, профессор кафедры «Комплексного обеспечения информационной безопасности» Государственного университета морского и речного флота им. адмирала С.О. Макарова</p></bio><email xlink:type="simple">laos-82@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4080-4340</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Митрофанов</surname><given-names>М. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Mitrofanov</surname><given-names>M. V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>доктор технических наук, доцент, доцент Военного учебного центра Национального исследовательского университета ИТМО</p></bio><email xlink:type="simple">vonafortim@yandex.ru</email><xref ref-type="aff" rid="aff-2"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7199-6384</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Куракин</surname><given-names>А. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Kurakin</surname><given-names>A. S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>кандидат технических наук, начальник направления ООО «Специальный Технологический Центр»</p></bio><email xlink:type="simple">nirt@mail.ru</email><xref ref-type="aff" rid="aff-3"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0005-2352-985X</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Крамской</surname><given-names>Н. Н.</given-names></name><name name-style="western" xml:lang="en"><surname>Kramskoy</surname><given-names>N. N.</given-names></name></name-alternatives><bio xml:lang="ru"><p>заместитель директора по разработке специальных средств – генеральный конструктор систем и комплексов криптографической защиты информации ООО «Специальный Технологический Центр»</p></bio><email xlink:type="simple">kram.com@mail.ru</email><xref ref-type="aff" rid="aff-3"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Государственный университет морского и речного флота им. адмирала С.О. Макарова<country>Россия</country></aff><aff xml:lang="en">Admiral Makarov State University of Maritime and Inland Shipping<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Национальный исследовательский университет ИТМО<country>Россия</country></aff><aff xml:lang="en">ITMO University<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-3"><aff xml:lang="ru">ООО «Специальный Технологический Центр»<country>Россия</country></aff><aff xml:lang="en">Special Technology Center LLC<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>07</day><month>03</month><year>2026</year></pub-date><volume>12</volume><issue>1</issue><fpage>16</fpage><lpage>25</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Соколов С.С., Лаута О.С., Митрофанов М.В., Куракин А.С., Крамской Н.Н., 2026</copyright-statement><copyright-year>2026</copyright-year><copyright-holder xml:lang="ru">Соколов С.С., Лаута О.С., Митрофанов М.В., Куракин А.С., Крамской Н.Н.</copyright-holder><copyright-holder xml:lang="en">Sokolov S.S., Lauta O.S., Mitrofanov M.V., Kurakin A.S., Kramskoy N.N.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/763">https://tuzs.sut.ru/jour/article/view/763</self-uri><abstract><sec><title>Актуальность</title><p>Актуальность. Современные бизнес-процессы критически зависят от непрерывной доступности данных, при этом частота инцидентов утраты информации из‑за ransomware‑атак, отказов оборудования и ошибок администраторов устойчиво растет. </p><p>Целью исследования является разработка и обоснование комплексного подхода к построению централизованных систем резервирования данных, обеспечивающих минимизацию времени восстановления и максимизацию вероятности успешного восстановления при катастрофических сбоях различной природы. </p></sec><sec><title>Методы</title><p>Методы. Методологической основой работы выступают системный подход к проектированию архитектуры резервного копирования, методы количественного анализа рисков и сравнительный анализ.</p></sec><sec><title>Решение (результаты)</title><p>Решение (результаты). Разработан комплексный архитектурный подход, основанный на централизованной pull‑ориентированной системе резервного копирования. Сформирована методика выбора между полным резервированием дисков и гранулярным файловым резервированием. </p><p>Научная новизна состоит в обосновании комплексной централизованной системы резервирования данных, объединяющей snapshot‑ориентированное резервирование, многоуровневую архитектуру хранения и pull‑модель с физически и логически изолированным сервером. </p><p>Теоретическая значимость заключается в развитии научно‑методического аппарата обеспечения непрерывности бизнес-процессов за счет формализации критериев выбора режимов резервирования и архитектурных решений с учетом ограниченности ресурсов и неоднородности данных. </p><p>Практическая значимость работы проявляется в разработке конкретных архитектурных требований и рекомендаций по построению систем резервного копирования. </p></sec></abstract><trans-abstract xml:lang="en"><sec><title>Relevance</title><p>Relevance. Modern business processes critically depend on the continuous availability of data, while the frequency of data loss incidents due to ransomware attacks, equipment failures, and administrative errors is steadily increasing.</p><p>The purpose of the study is to develop and validate a comprehensive approach to building centralized data backup systems that minimize recovery time and maximize the likelihood of successful recovery from catastrophic failures of various types.</p></sec><sec><title>Methods</title><p>Methods. The methodological basis of this study is a systems approach to backup architecture design, quantitative risk analysis methods, and comparative analysis.</p></sec><sec><title>Solution (Results)</title><p>Solution (Results). A comprehensive architectural approach based on a centralized pull-oriented backup system has been developed. A methodology for choosing between full disk backup and granular file backup has been formulated. The scientific novelty lies in the justification of a comprehensive centralized data backup system that combines snapshot-oriented backup, a multi-tiered storage architecture, and a pull model with a physically and logically isolated server.</p><p>The theoretical significance lies in the development of a scientific and methodological framework for ensuring business process continuity by formalizing criteria for selecting backup modes and architectural solutions, taking into account resource limitations and data heterogeneity.</p><p>The practical significance of the work lies in the development of specific architectural requirements and recommendations for building backup systems.</p></sec></trans-abstract><kwd-group xml:lang="ru"><kwd>snapshot‑технологии</kwd><kwd>ransomware‑атаки</kwd><kwd>система резервирования данных</kwd><kwd>защищенность от целенаправленного удаления резервных копий</kwd></kwd-group><kwd-group xml:lang="en"><kwd>snapshot technologies</kwd><kwd>ransomware attacks</kwd><kwd>data backup system</kwd><kwd>protection against targeted deletion of backups</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Hou Y., Guo L., Zhou C., Xu Y., Yin Z., Li S., et al. An Empirical Study of Data Disruption by Ransomware Attacks // Proceedings of the 46th International Conference on Software Engineering (ICSE ’24, Lisbon, Portugal, 14‒20 April 2024). New York: Association for Computing Machinery, 2024. P. 161. DOI:10.1145/3597503.3639090</mixed-citation><mixed-citation xml:lang="en">Hou Y., Guo L., Zhou C., Xu Y., Yin Z., Li S., et al. An Empirical Study of Data Disruption by Ransomware Attacks. Proceedings of the 46th International Conference on Software Engineering, ICSE ’24, 14‒20 April 2024, Lisbon, Portugal. New York: Association for Computing Machinery; 2024. p.161. DOI:10.1145/3597503.3639090</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions // Computers &amp; Security. 2018. Vol. 74. PP. 144‒166. DOI:10.1016/j.cose.2018.01.001</mixed-citation><mixed-citation xml:lang="en">Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers &amp; Security. 2018;74:144‒166. DOI:10.1016/j.cose.2018.01.001</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Котенко И.В., Саенко И.Б., Лаута О.С., Васильев Н.А., Садовников В.Е. Метод противодействия состязательным атакам на системы классификации изображений // Вопросы кибербезопасности. 2025. № 2(66). С. 114‒123. DOI:10.21681/2311-3456-2025-2-114-123. EDN:MKWZFT</mixed-citation><mixed-citation xml:lang="en">Kotenko I.V., Saenko I.B., Lauta O.S., Vasiliev N.A., Sadovnikov V.E. A Method of countering adversarial attacks on image classification systems. Cybersecurity Issues. 2025;2(66):114‒123. (in Russ.) DOI:10.21681/2311-3456-2025-2-114-123. EDN:MKWZFT</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Hou Y., Guo L., Zhou C., Zhang Q., Liu W., Sun C., et al. Preventing Disruption of System Backup against Ransomware Attacks // Proceedings of the ACM on Software Engineering. 2025. Vol. 2. Iss. ISSTA. PP. 229‒249. DOI:10.1145/3728880. EDN:XZVFZD</mixed-citation><mixed-citation xml:lang="en">Hou Y., Guo L., Zhou C., Zhang Q., Liu W., Sun C., et al. Preventing Disruption of System Backup against Ransomware Attacks. Proceedings of the ACM on Software Engineering. 2025;2(ISSTA):229‒249. DOI:10.1145/3728880. EDN:XZVFZD</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Zhou C., Guo L., Hou Y., Ma Z., Zhang Q., Wang M. Limits of I/O Based Ransomware Detection: An Imitation Based At-tack // Proceedings of the Symposium on Security and Privacy (SP, San Francisco, USA, 21‒25 May 2023). IEEE, 2023. DOI:10.1109/SP46215.2023.10179372</mixed-citation><mixed-citation xml:lang="en">Zhou C., Guo L., Hou Y., Ma Z., Zhang Q., Wang M. Limits of I/O Based Ransomware Detection: An Imitation Based Attack. Proceedings of the Symposium on Security and Privacy, SP, 21‒25 May 2023, San Francisco, USA. IEEE; 2023. DOI:10.1109/SP46215.2023.10179372</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Kolodenker E., Koch W., Stringhini G., Egele M. PayBreak: Defense Against Cryptographic Ransomware // Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIACCS, Abu Dhabi, United Arab Emirates, 2‒6 April 2017). New York: Association for Computing Machinery, 2017. PP. 599‒611. DOI:10.1145/3052973.3053035</mixed-citation><mixed-citation xml:lang="en">Kolodenker E., Koch W., Stringhini G., Egele M. PayBreak: Defense Against Cryptographic Ransomware. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIACCS, 2‒6 April 2017, Abu Dhabi, United Arab Emirates. New York: Association for Computing Machinery; 2017. p.599‒611. DOI:10.1145/3052973.3053035</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Николаев В.В., Саенко И.Б. Оптимизация распределения информационных ресурсов в едином информационном пространстве // Труды учебных заведений связи. 2024. Т. 10. № 3. С. 87‒103. DOI:10.31854/1813-324X-2024-10-3-87-103. EDN:UFROMW</mixed-citation><mixed-citation xml:lang="en">Nikolaev V.V., Saenko I.B. Optimization of Information Resources Distribution in Common Information Space. Proceedings of Telecommunication Universities. 2024;10(3):87‒103. (in Russ.) DOI:10.31854/1813-324X-2024-10-3-87-103. EDN:UFROMW</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Hirano M., Hodota R., Kobayashi R. RanSAP: An open dataset of ransomware storage access patterns for training machine learning models // Forensic Science International: Digital Investigation. 2021. Vol. 40. P. 301314 DOI:10.1016/j.fsidi.2021.301314. EDN:OZNYCW</mixed-citation><mixed-citation xml:lang="en">Hirano M., Hodota R., Kobayashi R. RanSAP: An open dataset of ransomware storage access patterns for training machine learning models. Forensic Science International: Digital Investigation. 2021;40:301314 DOI:10.1016/j.fsidi.2021.301314. EDN:OZNYCW</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Hirano M., Kobayashi R. RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors // Computers &amp; Security. 2025. Vol. 150. P. 104202. DOI:10.1016/j.cose.2024.104202. EDN:GUQFQK</mixed-citation><mixed-citation xml:lang="en">Hirano M., Kobayashi R. RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors. Computers &amp; Security. 2025;150:104202. DOI:10.1016/j.cose.2024.104202. EDN:GUQFQK</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Min D., Park Y., Yoon S., Walker R., Lee J., Park S. Amoeba: An Autonomous Backup and Recovery SSD for Ransom-ware Attack Defense // IEEE Computer Architecture Letters. 2018. Vol. 17. Iss. 2. PP. 245‒248. DOI:10.1109/LCA.2018.2883431</mixed-citation><mixed-citation xml:lang="en">Min D., Park Y., Yoon S., Walker R., Lee J., Park S. Amoeba: An Autonomous Backup and Recovery SSD for Ransomware Attack Defense. IEEE Computer Architecture Letters. 2018;17(2):245‒248. DOI:10.1109/LCA.2018.2883431</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Ilau M.-C., Baldwin A., Caulfield T., Pym D. Modelling and simulating organizational ransomware recovery: structure, methodology, and decisions // Journal of Cybersecurity. 2025. Vol. 11. Iss. 1. DOI:10.1093/cybsec/tyaf035</mixed-citation><mixed-citation xml:lang="en">Ilau M.-C., Baldwin A., Caulfield T., Pym D. Modelling and simulating organizational ransomware recovery: structure, methodology, and decisions // Journal of Cybersecurity. 2025;11(1). DOI:10.1093/cybsec/tyaf035</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Kritika Er. A comprehensive literature review on ransomware detection using deep learning techniques // Cyber Security and Applications. 2025. Vol. 3. P. 100078. DOI:10.1016/j.csa.2024.100078</mixed-citation><mixed-citation xml:lang="en">Kritika Er. A comprehensive literature review on ransomware detection using deep learning techniques. Cyber Security and Applications. 2025;3:100078. DOI:10.1016/j.csa.2024.100078</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
