V.I. Budzko1, V.G. Belenkov2
1, 2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@frccsc.ru, 2 vbelenkov@frccsc.ru
The aim of the work is to determine the conditions that the discipline of forming integrity synchronization points (ISP) used at the systems implementing data intensive domains (DID-system) object must meet. An approach is considered that allows minimizing the total time costs for performing special actions that create the possibility of restoring the system, and its actual restoration after the implementation of cyber-attacks that lead to its failures. The goal is achieved by consistently solving the following tasks to determine:
classes of failures of the DID-system that occurred as a result of cyber-attacks on it, according to the consequences that the attack is aimed at achieving, and the methods for its recovery after failures;
types of ISP at the DID-system site;
classes of recovery procedures and the basic recovery steps performed during the procedures of each class;
conditions that the discipline of forming the ISP must meet, minimizing the time spent on performing procedures to ensure the restoration of the DID-system and its restoration after the implementation of cyber-attacks.
Budzko V.I., Belenkov V.G. Cybersecurity of systems implementing data intensive domains. The discipline of forming integrity synchronization points on a system object that implements data intensive domains. Highly Available Systems. 2025. V. 21. № 4.
P. 5−17. DOI: https://doi.org/10.18127/j20729472-202504-01 (in Russian)
- Budzko V.I. Obespechenie celostnosti avtomatizirovannoj informacionnoj sistemy`. Algoritmy` i organizaciya resheniya e`konomicheskix zadach. Vy`p. 14. M.: Izd-vo «Statistika». 1980. S. 6–38.
- Budzko V.I. Vy`bor strategij vosstanovleniya celostnosti krupnomasshtabnoj avtomatizirovannoj informacionno-upravlyayushhej sistemy` integrirovannogo tipa. Sistemy` i sredstva informatiki. Specz. vy`p. «Matematicheskoe i algoritmicheskoe obespechenie informacionno-telekommunikacionny`x sistem». 2002. S. 51–85.
- Budzko V.I. Kolichestvenny`e ocenki otkazoustojchivy`x i katastrofoustojchivy`x reshenij. Voprosy` zashhity` informacii. 2003. № 2(61). S. 19–32.
- Budzko V.I., Belenkov V.G., Il`yasov D.F., Sinicin I.N. Problemy` obespecheniya katastrofoustojchivosti krupnomasshtabny`x informacionno-telekommunikacionny`x sistem. Tezisy` dokladov Pervoj obshheros. ezhegodnoj nauchno-prakt. konf. «Zashhita informacii v sub``ektax Rossijskoj Federacii». 17–20 sentyabrya 2002 g. Sochi, S. 38–51.
- Budzko V.I., Kejer P.A., Belenkov V.G. Katastrofoustojchivy`e resheniya v informacionno-telekommunikacionny`x sistemax vy`sokoj dostupnosti. Sistemy` vy`sokoj dostupnosti. 2005. № 1. T. 1. S. 57–69.
- Kul`gin M. 54 vida kiberatak, o kotory`x sleduet znat` v 2024 godu. https://dzen.ru/a/ZUYNJUusBWYBYvzz. Vy`lozheno 4 noyabrya 2023.
- Brenda Buckman. The 36 Most Common Cyberattacks [2025]. Published: May 2, 2025. https://www.huntress.com/blog/most-common-cyberattacks
- Brooke Becher. 18 Types of Cyber Attacks and How to Prevent Them (updated by Brennan Whitfield, Jul 08, 2024) https://builtin.com/articles/ types-of-cyber-attacks
- Tietsort J.R. (Reviewed by Alina Benny). 17 Types of Cyber Attacks Commonly Used By Hackers. May 19, 2023. https://www.aura.com/ learn/types-of-cyber-attacks
- Ventcel` E.S., Ovcharov L.A. Teoriya veroyatnostej i eyo inzhenerny`e prilozheniya. 2-e izd. M.: Vy`sshaya shkola. 2000. 480 s.
- Gnedenko B.V., Kovalenko I.N. Vvedenie v teoriyu massovogo obsluzhivaniya. M.: Izdatel`stvo LKI. 2021. 398 s.
- Kartashevskij V.G. Osnovy` teorii massovogo obsluzhivaniya: Uchebnoe posobie dlya vuzov. M.: Radio i svyaz`. 2006. 86 s.

