Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective