Active attacks involving interception, injection, modification, spoofing of data unit addresses