That is not easy to know... it is supossed that you know the ESSIDs and BSSIDs of your own business. You can check the entire list in first place to see if everything is matching. The procedure from this base could be the following:
- How to know if there is some rogue AP?
If you have your list updated you'll know about any strange MAC on your ESSID. In the case the Rogue AP cloned one of your MAC addresses, you'll see one of your BSSIDs duplicated and that is a very suspicious thing that only can mean there is a rogue AP independently of where it comes.
- How to know where is the rogue AP coming?
Once located the data of the Rogue AP, the only method to know where is it, is to measure the signal strength and moving around you'll see if the signal is increasing or decreasing. AFAIK there is no other method.
I know if there are more than 60 networks, the scan list is an absolute chaos and is not an easy task. That's the reason about is important to audit regularly your wireless network to make the inventary of the legitimate Access Points. This is precisely one of the points on the known PCI Compliance. It forces to a company which is handling credit card and banking data to perform this auditory every 3 months. Anyway in my opinion is a good practice to perform this on any company even if is not handling banking data.