Data protection operations including replication operations that dynamically adapt a topology of replica virtual machines. A data protection system may implement a machine model that is trained using, as input, characteristics of virtual machines. When a failure is predicted, a topology of the replica virtual machines is changed. The topology may also change when changes in the environment are detected. The changes may include redistributing the protected applications to the replica virtual machines and/or scaling the replica virtual machines.