I. Introduction
The Destination Traffic Fingerprint method was described in detail by the authors in [1] and [2]. The base idea is that a computer connected to a network, will generate traffic to a set of destinations. It is very possible that from all the IP destinations, to extract a few of them, characterized by the fact that they have a constant traffic in time.