“…The motivation is often network configuration management, e.g., analysis of potential impacts in case of failures, performance issues, and malicious attacks [4], [5], [1]. The previous research revealed dependencies using passively monitored network traffic [6], active approach [7], system logs instead of network traces [8], and applying time series or graph mining [9], [10]. Even though it provided valuable results, it focused on specific input data, had some limitations, or revealed only specific types of dependencies.…”