In recent years, Peer-To-Peer (P2P) technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate spam, click fraud and steal sensitive information. Compared with traditional botnets, P2P botnets are harder to be defended and hijacked. In this paper, the authors discuss various P2P botnet detection approaches and evaluate their effectiveness. They identify the advantages and shortcomings of each of the discussed techniques.