Custom Intrusion Policies for Access Control