This document summarizes different botnet architectures including centralized, peer-to-peer, hybrid, and HTTP with peer-to-peer. It describes the life cycle of bots from infection to performing malicious tasks. It also discusses a self-healing system architecture inspired by how biological systems develop immunity. The conclusion states that botnets have a direct influence on cybercrime and it is an ongoing effort between attacks and defenses.