The methods of attack against blockchains are obviously different from those commonly used against traditional application solutions, as the vulnerabilities of the various architectures differ from each other.
In principle, blockchain-based technologies are usually immune to common attacks on traditional web applications. In other words, attacking a blockchain-based architecture adopting the typical attack strategies used to attack traditional architectures would not work, as the blockchain decentralized model makes these strategies mostly ineffective.
It should be borne in mind, however, that some specific blockchain implementations may still suffer from some form of centralization in some of their relevant components, including the consensus mechanism of the network. The preferred target by the attackers thus becomes the consensus mechanism; since each...