What is claimed is:1. A method for HTTP service fingerprint and classification using machine learning, the method comprising:training a HTTP-based machine-learning model, using machine-learning training techniques and a historical dataset of labelled Access Point HTTP service response features collected by a feature extractor module;generating the HTTP-based machine-learning model to perform classification of HTTP services;collecting, by a collector module, HTTP service response packets from multiple HTTP servers having known classification labels;extracting, by the feature extraction module, features from the collected HTTP service response packets;labelling the extracted features from the HTTP service response packets, using labels from a set of classes defined according to a classification objective of the HTTP-based machine-learning model;selecting a set of features from the labelled HTTP service response packet features, using feature selection techniques, that are the best suitable features to be used in the HTTP-based machine-learning model; andclassifying to perform classification of HTTP services by:using the HTTP-based machine-learning model trained with labelled samples of the selected set of features from the labelled HTTP service response packet features,selectively applying a second machine learning model that collects data present inside an HTTP body of the HTTP service response packets, andselectively applying a third machine learning model that extracts human readable text information of a page rendered by a user browser.2. The method of claim 1, wherein the collecting the HTTP response packets comprises:passively sniffing a network to obtain the HTTP service redirection response packets; andsending the obtained HTTP service redirection response packets to the feature extractor module.3. The method of claim 1, wherein the collecting the HTTP redirection response packets comprises:actively sending an HTTP request to the network gateway;receiving the HTTP response packets from the network gateway HTTP server; andsending the received HTTP response packets to the feature extractor module.4. The method of claim 1, wherein the collecting the HTTP redirection response packets comprises:actively sending an HTTP request to a known HTTP server that has a known HTTP response behavior;receiving the HTTP response packets from the HTTP server;comparing the known HTTP server response behavior with the received HTTP server response packets to verify if it consists of a redirection response type; andbased on the comparing, sending the received HTTP server response packets that present different behavior from the known HTTP response behavior, which implies that the received HTTP response is an HTTP response of redirection type, to the feature extractor module.5. The method of claim 1, wherein the extracting the features from the collected HTTP redirect response packets comprises:extracting the features from a header of the HTTP redirect response packets;extracting the features from a body of the HTTP redirect response packets; andextracting the features from text data contained in a body of HTTP redirect response packets.6. The method of claim 5, wherein the extracting the features from the collected HTTP redirect responses further comprises:separating the extracted features into sets determined by a feature selection process, to be used in the HTTP-based machine-learning model to receive a specific set of features from the HTTP redirect response packets.7. The method of claim 1, wherein the classifying comprises:classifying, using a plurality of machine-learning models trained with labelled samples of HTTP response, the selected set of features from the HTTP response packet features; andcombining results of the plurality of machine-learning models trained with labeled samples of HTTP responses, using a model ensemble technique to obtain a final classification result to be used in external solutions to classify HTTP servers.8. The method of claim 1, wherein the classification model trained with labelled samples of HTTP responses is represented as a binary file, object file, parameter values in case of parametric models, weights, text description, or any type or combination of data files that entirely represent a machine-learning model.9. The method of claim 1, further comprising recognizing an HTTP server by applying one or multiple machine-learning models, previously trained with labelled samples of HTTP responses, with recognition purposes.10. The method of claim 8, wherein the recognition purposes include at least one of:identifying whether the HTTP Server is a known HTTP server or service;identifying whether the HTTP Server belongs to a known class of HTTP server or services.11. The method of claim 1, further comprising identifying characteristics of the HTTP server by applying one or multiple machine-learning models with purposes to identify the characteristics based on the HTTP server response packets.12. The method of claim 11, wherein the identifying the characteristics includes at least one of:identifying a type of network infrastructure facility;identifying network properties of the communication link; andidentifying vulnerabilities that may be presented in the network.13. The method of claim 12, wherein the HTTP server is classified between malicious and benign classes, by applying one or multiple machine-learning models with purpose of detecting HTTP servers.14. The method of claim 13, wherein the HTTP server is labelled as benign or malicious according to suspicious activities, including at least one of:a specific type of attack that an HTTP server may perform against a user;a known malicious reputation that a type of HTTP server may have;a software implementation of HTTP which is known to be used for penetrating test purposes; andany type of bad behavior an HTTP server may have that is considered for non-legitimate purposes.15. The method of claim 1, wherein the extracted features includes using information from the displayed text visible in user screen, which is rendered by the user browser using the data of the HTTP response content, such as HTML data, to be translated into a machine-learning model feature vector.16. The method of claim 15, wherein the displayed text includes text visible in user screen includes text data that is displayed based on HTTP content of a last HTTP response from the HTTP server.17. The method of claim 16, further comprising defining a word category as a label for the samples of HTTP server response, using a set of words, from the displayed text visible in user screen, that shares a common property, meaning, or relationship including semantical, syntactical, morphological, or grammatical.18. The method of claim 17, wherein the features extracted from the displayed text visible in user screen includes at least one of:counting a number of times a specific word appears in the displayed text visible in user screen;counting a number of words per word category;counting a number of times a specific group of words appears together in the displayed text visible in user screen;counting a number of times a specific group of words appears together in a specific order;counting a number of times a specific group of words appears in sequence together in a specific order;binary features representing an existence of specific words, word categories, word groups, or word sequences; andany other combination of word, word category, or word groups.19. The method of claim 1, wherein the features extracted from the collected HTTP server response packets include at least one of:a presence of specific HTML tags;a count of the number of HTML tags;a count of the number of HTML tags inside an HTML tag context;a count of the number of HTML tags with specific attributes;a count of the number of a specific HTML tag, in which a specific attribute value matches a specific string;a count of the number of a specific HTML tag, in which a specific attribute value contains a specific string or character;a count of the number of a specific HTML tag, in which a specific attribute starts with or ends with a specific string or characters;a count of the number of occurrences of a specific string, character, or sequence of characters appears in a specific attribute value;a count of the number of specific strings of the displayed text of the HTML data;a count of the number of times a specific tag has a null or invalid value for a specific attribute;whether a specific HTML tag exists;whether a specific HTML tag with a specific attribute exists;whether a specific HTML tag with a specific attribute and a specific attribute value exists;a count of the number of HTML comment blocks;a count of the number of time a specific tag has a valid value for a specific attribute;a count of the number of time a specific media file is loaded;a count of the number of times external content is loaded;a count of the number of patterns in script source;a count of the number of times that a specific tag has a specific attribute with value corresponding to a specific file extension;whether page redirection instructions exist in the data;a count of the number of times a page redirects instruction occurs;a count of the number of words present inside a specific HTML tag context;a count of the number of times a specific pattern that indicate the presence of a specific element in a page occurs;whether a specific tag is in upper case;any other feature that represents a property, the existence of a pattern, or the number of times a pattern occurs in the entire, or part of, the HTTP content, in which the property can be translated into a numeric value; andany of the aforementioned features but restricted to a specific HTML tag context instead of the entire HTML data.20. The method of claim 1, wherein the features extracted from the collected HTTP server response packets include at least one of:a total number of header fields;a total size of HTTP header;a total size of HTTP content;a binary feature representing the presence of specific header fields;an order between two or more header fields when present;a binary feature indicating whether header field names are lower or upper case;a binary feature representing the exact match of a header field value with a known value;a presence of specific strings in a header field value;a presence of specific characters in a header field value;a count of specific strings in a header field value;a count of specific characters in a header field value;a length of a header field value;a numeric value of a header field value;a number of words present in a header field value; anda number of header fields that are unknown by the feature extraction module.