A network of infected systems under the control of a hacker, whose intention is to damage other computer networks by making them unavailable is called __________.
Select the correct option from below list
a)Flash cookie
b)Botnet
c)Trojan
d)DDoS attack