This document provides a summary of a journal article that reviews techniques for detecting and suppressing botnets in cloud computing environments. It discusses how botnets pose a security threat and how cloud environments provide botmasters rich computing resources to deploy attacks. The document reviews literature on various botnet detection techniques including network-based, host-based, and those using intrusion detection system data. It also discusses an active analysis technique using honeypots and honeynets, and a passive analysis technique using darknets. Finally, it introduces a distributed botnet suppression system for clouds and a collaborative network security system to automatically detect and process botnet traffic across networks.