Users’ Fingerprinting Techniques from TCP Traffic