In the passive traffic-investigation technique, the attacker extracts options from the visitors of a distinct stream on a single facet…